OCP 4.21 Remediation Groupings
| β Back to OCP 4.21 Compliance Status | View Detailed Group Pages |
This document catalogs all compliance remediations for OCP 4.21, collected from the OpenShift Compliance Operator and organized by severity (HIGH, MEDIUM, LOW).
Tip: Each group has a dedicated page with detailed implementation examples that you can link directly from PRs.
Quick Summary
From E8 (Essential Eight) and CIS benchmark scans: 82 total remediations
| Severity | Groups | Settings | Status |
|---|---|---|---|
| HIGH | 3 groups | 3 unique | 3 In Progress |
| MEDIUM | 12 groups | 36 unique | 1 On Hold, 11 Pending |
| LOW | 2 groups | 2 unique | 2 Pending |
Remediation Status
| Group | Category | Severity | Count | Status | Compare | Jira | PR |
|---|---|---|---|---|---|---|---|
| H1 | Crypto Policy | HIGH | 1 | π΅ In Progress | - | CNF-21212 | #529 |
| H2 | PAM Empty Passwords | HIGH | 1 | π΅ In Progress | - | CNF-21212 | #529 |
| H3 | SSHD Empty Passwords | HIGH | 1 | π΅ In Progress | - | CNF-21326 | #466 |
| M1 | SSHD Configuration | MEDIUM | 7 | π‘ Pending | π¦ | - | - |
| M2 | Kernel Sysctl | MEDIUM | 4 | βͺ On Hold | π¦ | CNF-21196 | - |
| M3 | Audit DAC | MEDIUM | 2 | π‘ Pending | π¦ | - | - |
| M4 | Audit SELinux | MEDIUM | 6 | π‘ Pending | π¦ | - | - |
| M5 | Audit Modules | MEDIUM | 3 | π‘ Pending | π¦ | - | - |
| M6 | Audit Time | MEDIUM | 5 | π‘ Pending | π¦ | - | - |
| M7 | Audit Auth | MEDIUM | 5 | π‘ Pending | π¦ | - | - |
| M8 | Audit Network | MEDIUM | 1 | π‘ Pending | π¦ | - | - |
| M9 | Auditd Config | MEDIUM | 1 | π‘ Pending | π¦ | - | - |
| M10 | API Encryption | MEDIUM | 2 | π‘ Pending | π¦ | - | - |
| M11 | Ingress TLS | MEDIUM | 1 | π‘ Pending | π¦ | - | - |
| M12 | Audit Profile | MEDIUM | 1 | π‘ Pending | π¦ | - | - |
| L1 | SSHD LogLevel | LOW | 1 | π‘ Pending | π¦ | - | - |
| L2 | Sysctl dmesg | LOW | 1 | π‘ Pending | π¦ | - | - |
Group IDs: Groups are labeled by severity and sequence number:
- H = HIGH severity (H1, H2, H3)
- M = MEDIUM severity (M1-M12)
- L = LOW severity (L1, L2)
HIGH Severity Remediations
H1: Crypto Policy β π΅ In Progress β PR #529
File: 75-crypto-policy-high.yaml
Jira: CNF-21212
| Setting | Value | Description |
|---|---|---|
| crypto-policy | DEFAULT:NO-SHA1 | System-wide crypto policy without SHA1 |
Source Files:
H2: PAM Empty Passwords β π΅ In Progress β PR #529
File: 75-pam-auth-high.yaml
Jira: CNF-21212
| Setting | Description |
|---|---|
| no-empty-passwords | Disable nullok in PAM system-auth and password-auth |
Source Files:
H3: SSHD Empty Passwords β π΅ In Progress β PR #466
File: 75-sshd-hardening.yaml (consolidated with M1, L1)
Jira: CNF-21326
| Setting | Value | Description |
|---|---|---|
| PermitEmptyPasswords | no | Prevent SSH login with empty passwords |
Source Files:
high/rhcos4-e8-worker-sshd-disable-empty-passwords.yamlhigh/rhcos4-e8-master-sshd-disable-empty-passwords.yaml
Note: This HIGH severity SSHD setting is consolidated into PR #466 along with MEDIUM (M1) and LOW (L1) SSHD settings.
Manual HIGH Checks β No auto-remediation available
These HIGH severity checks require manual intervention:
| Check | Type | Description |
|---|---|---|
ocp4-cis-configure-network-policies-namespaces |
CIS | Ensure all application namespaces have NetworkPolicy defined |
ocp4-cis-rbac-least-privilege |
CIS | Review RBAC permissions for least privilege |
MEDIUM Severity Remediations
M1: SSHD Configuration β π΅ In Progress β PR #466
File: 75-sshd-hardening.yaml (consolidated with H3, L1)
Jira: CNF-19031
Count: 7 settings
| Setting | Value | Description |
|---|---|---|
| PermitRootLogin | no | Disable direct root SSH access |
| GSSAPIAuthentication | no | Disable GSSAPI authentication |
| IgnoreRhosts | yes | Disable rhost authentication |
| IgnoreUserKnownHosts | yes | Ignore userβs known_hosts file |
| PermitUserEnvironment | no | Block user environment variable passing |
| StrictModes | yes | Enable strict mode checking |
| PrintLastLog | yes | Display last login information |
Source Files (7)
medium/rhcos4-e8-worker-sshd-disable-root-login.yamlmedium/rhcos4-e8-worker-sshd-disable-gssapi-auth.yamlmedium/rhcos4-e8-worker-sshd-disable-rhosts.yamlmedium/rhcos4-e8-worker-sshd-disable-user-known-hosts.yamlmedium/rhcos4-e8-worker-sshd-do-not-permit-user-env.yamlmedium/rhcos4-e8-worker-sshd-enable-strictmodes.yamlmedium/rhcos4-e8-worker-sshd-print-last-log.yaml
M2: Kernel Hardening (Sysctl) β βͺ On Hold β PR #528 closed
File: 75-sysctl-medium.yaml
Jira: CNF-21196
Count: 4 settings
| Setting | Value | Description |
|---|---|---|
| kernel.randomize_va_space | 2 | Full ASLR - randomizes memory layout |
| kernel.unprivileged_bpf_disabled | 1 | Prevent BPF-based privilege escalation |
| kernel.yama.ptrace_scope | 1 | Restrict ptrace to parent-child processes |
| net.core.bpf_jit_harden | 2 | Harden BPF JIT against spraying attacks |
M3: Audit Rules - DAC Modifications β π‘ Pending
File: 75-audit-dac-medium.yaml
Count: 2 settings
| Rule | Description |
|---|---|
| chmod | Audit file permission changes via chmod |
| chown | Audit file ownership changes via chown |
M4: Audit Rules - SELinux β π‘ Pending
File: 75-audit-privilege-medium.yaml
Count: 6 settings
| Rule | Description |
|---|---|
| chcon | Audit SELinux context changes |
| restorecon | Audit SELinux context restoration |
| semanage | Audit SELinux management commands |
| setfiles | Audit SELinux file labeling |
| setsebool | Audit SELinux boolean changes |
| seunshare | Audit SELinux unshare operations |
Source Files (6)
medium/rhcos4-e8-worker-audit-rules-execution-chcon.yamlmedium/rhcos4-e8-worker-audit-rules-execution-restorecon.yamlmedium/rhcos4-e8-worker-audit-rules-execution-semanage.yamlmedium/rhcos4-e8-worker-audit-rules-execution-setfiles.yamlmedium/rhcos4-e8-worker-audit-rules-execution-setsebool.yamlmedium/rhcos4-e8-worker-audit-rules-execution-seunshare.yaml
M5: Audit Rules - Kernel Modules β π‘ Pending
File: 75-audit-modules-medium.yaml
Count: 3 settings
| Rule | Description |
|---|---|
| delete_module | Audit kernel module unloading (rmmod) |
| finit_module | Audit kernel module loading (finit) |
| init_module | Audit kernel module loading (init) |
M6: Audit Rules - Time Modifications β π‘ Pending
File: 75-audit-time-medium.yaml
Count: 5 settings
| Rule | Description |
|---|---|
| adjtimex | Audit fine-grained time adjustments |
| clock_settime | Audit clock setting operations |
| settimeofday | Audit time-of-day changes |
| stime | Audit legacy time setting |
| /etc/localtime | Watch for localtime file changes |
Source Files (5)
M7: Audit Rules - Login Monitoring β π‘ Pending
File: 75-audit-auth-medium.yaml
Count: 5 settings
| Rule | Description |
|---|---|
| faillock | Monitor failed login attempts |
| lastlog | Monitor last login records |
| tallylog | Monitor login attempt tallies |
| sudoers | Monitor sudo configuration changes |
| usergroup | Monitor /etc/passwd, /etc/group, /etc/shadow changes |
Source Files (5)
medium/rhcos4-e8-worker-audit-rules-login-events-faillock.yamlmedium/rhcos4-e8-worker-audit-rules-login-events-lastlog.yamlmedium/rhcos4-e8-worker-audit-rules-login-events-tallylog.yamlmedium/rhcos4-e8-worker-audit-rules-sysadmin-actions.yamlmedium/rhcos4-e8-worker-audit-rules-usergroup-modification.yaml
M8: Audit Rules - Network Config β π‘ Pending
File: 75-audit-network-medium.yaml
Count: 1 setting
| Rule | Description |
|---|---|
| network_modification | Audit sethostname, setdomainname syscalls |
Source Files:
M9: Auditd Configuration β π‘ Pending
File: 75-auditd-config-medium.yaml
Count: 1 setting
| Setting | Value | Description |
|---|---|---|
| name_format | hostname | Log hostname in audit records |
Source Files:
M10: API Server Encryption β π‘ Pending
Type: APIServer CRD
File: 75-api-server-encryption-medium.yaml
Count: 2 remediations
| Setting | Value | Description |
|---|---|---|
| encryption.type | aescbc | Enable AES-CBC encryption at rest |
Source Files:
M11: Ingress TLS Ciphers β π‘ Pending
Type: IngressController CRD
File: 75-ingress-tls-medium.yaml
Count: 1 remediation
| Setting | Description |
|---|---|
| tlsSecurityProfile | Custom TLS profile with specific cipher suites |
Source Files:
M12: Audit Profile β π‘ Pending
Type: APIServer CRD
File: 75-audit-profile-medium.yaml
Count: 1 remediation
| Setting | Value | Description |
|---|---|---|
| audit.profile | WriteRequestBodies | Enhanced audit logging |
Source Files:
LOW Severity Remediations
L1: SSHD LogLevel β π΅ In Progress β PR #466
File: 75-sshd-hardening.yaml (consolidated with H3, M1)
Jira: CNF-19031
| Setting | Value | Description |
|---|---|---|
| LogLevel | INFO | Set SSH logging to INFO level |
Source Files:
L2: Sysctl dmesg_restrict β π‘ Pending
File: 75-sysctl-low.yaml
| Setting | Value | Description |
|---|---|---|
| kernel.dmesg_restrict | 1 | Restrict kernel log access to privileged users |
Source Files:
Notes
- Severity Source: Severity levels come directly from Compliance Operatorβs ComplianceCheckResult objects
- File Naming: Use
75-<category>-<severity>.yamlpattern - SSHD Consolidation: All SSHD settings (H3, M1, L1) consolidated into
75-sshd-hardening.yamlin PR #466 - PR #529: Non-SSHD HIGH severity items (crypto-policy, PAM)
- PR #466: All SSHD hardening (HIGH + MEDIUM + LOW)