Create a Custom Scan Policy with OpenSCAP

30 minutes
  • 2 Learning Objectives

About this Hands-on Lab

In this hands-on lab, we will use the SCAP Workbench tool to create a custom policy and scan a host with it. SCAP Workbench comes with preconfigured rule sets, from which we can create our own custom policies we’ll use to scan our environment for compliance with internal security policies.

*This course is not approved or sponsored by Red Hat.*

Learning Objectives

Successfully complete this lab by achieving the following learning objectives:

Create a Custom OpenSCAP Policy
  1. After giving the lab an extra two minutes to fully set up, use VNC on your computer to connect to the public IP address of the instance on port 5901 (x.x.x.x:5901).
  1. Open SCAP Workbench:

    • Applications > System Tools > SCAP Workbench
  2. Select RHEL7 next to Select content to load:.

  3. Click the Customize button next to Profile.

  4. Provide a New Profile ID of xccdf_org.ssgproject.custom_profile_1.

  5. In the customizing window:

    1. Click the Deselect All button at the top.
    2. Under Services > Obsolete Services > Telnet, check the box next to Uninstall telnet-server Package.
    3. Under Services > FTP Server > Disable vsftpd if Possible, check the box next to Uninstall vsftpd Package.
    4. Under System Settings > Network Configurations and Firewalls > firewalld > Inspect and Activate Default firewalld Rules, check the box next to Verify firewalld Enabled and Install firewalld.
  6. Click the OK button at the bottom of the customization window.

  7. Now, in the SCAP Workbench window, click on File, Save Customization Only, and name the customization custom_profile_1.xml.

Scan the Localhost with a Custom Profile
  1. From within the SCAP Workbench window, select Local Machine as the target, and then click the Scan button at the bottom to start a scan using the custom profile.

  2. Once the scan finished, click the Close button in the Diagnostics window.

  3. Click the Save Results button at the bottom, and select HTML Report.

  4. Enter scan_results.html as the name of the report, and click Save.

Additional Resources

There was a recent security incident scare at your organization, and you have taken it upon yourself to ensure some basic security measures are already in place on your hosts. To do so, you need to create and save a custom profile within OpenSCAP that meets the below requirements.

Once the custom profile is created, run a scan against the local machine, generate a report named scan_results.html, and save it in the cloud_user's home directory. OpenSCAP is already installed on the host you'll be scanning.

Requirements:

  1. A firewall should be installed.
  2. A firewall should be running.
  3. FTP server should be removed.
  4. Telnet server should be removed.
  • Use the Profile ID name of xccdf_org.ssgproject.custom_profile_1 .
  • Save the customization as custom_profile_1.xml.

Connecting to the lab:

  • After giving the lab an extra two minutes to fully set up, use VNC on your computer to connect to the public IP address of the instance on port 5901 (x.x.x.x:5901).
  • Log in with the username and password generated by the lab.

What are Hands-on Labs

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Sign In
Welcome Back!

Psst…this one if you’ve been moved to ACG!

Get Started
Who’s going to be learning?