Even better news, applying STIG settings is built into the Rocky Linux 8 anaconda installer, under Security Profiles. Rocky Linux is a bug for bug derivative of RHEL 8 and as such the content published for the DISA RHEL8 STIG is in parity for both operating systems. As multi-part series, we will also be covering how to test STIG compliance, adapt STIG settings, and apply other STIG content in this environment. In this guide we are going to cover how to apply the DISA STIG for RHEL8 for a New Installation of Rocky Linux 8. SCAP - Secure Content Automation Protocol.STIG - Secure Technical Implementation Guide.DISA - Defense Information Systems Agency.Verifying DISA STIG Compliance with OpenSCAP - Part 2ĭISA STIG security enterprise HOWTO: STIG Rocky Linux 8 Fast - Part 1 ¶ Terminology Reference ¶ Step 11: Log in to your STIG'd Rocky Linux 8 System! Step 10: Once the installation is completes, click "Reboot System" Step 9: Click "Done", and then "Begin Installation" Step 8: Create a user account, and set that user to administrator Step 7: Click "Done", and Continue To Final Setup Step 5: Configure software for your environment: Server install without a GUI. Step 2: Download the Rocky Linux 8 DVD ISO Host-based Intrustion Detection System (HIDS)īash - Conditional structures if and case Building and Installing Custom Linux KernelsĪutomatic Template Creation - Packer - Ansible - VMware vSphere
0 Comments
Leave a Reply. |