Security technical implementation guides (STIGs) provide a standardized set of security protocols for practically any system. From networks to servers and computers, STIGs are designed to enhance overall security and reduce vulnerabilities. But what happens when the guidelines vary across an enterprise? How do you apply these to a specific product without breaking it? Challenge accepted.
In my previous work, I implemented the RHEL 7 DISA STIG against a functioning Satellite server and found that it would break Satellite outright. Without knowing the exact cause for the functionality of Satellite to stop working, I would have to develop a methodology for figuring out what exactly caused it to fail. After testing each DISA STIG line by line, I’ve documented the steps in an effort to save others time and prevent the need to start from scratch. When using the process outlined below, the security components are built in to begin with so to not break the product - in this case, Satellite 6 - in the future other products.
- For testing purposes, I created the below environment to test with.
- Virtual Box running below VM's on a laptop
- RHEL 7.5 Disconnected Satellite 6.3
- RHEL 7.5 Disconnected External Capsule 6.3 Server
- RHEL 7.5 IDM Server on RHEL 7.5
- RHEL 7.5 Client
- RHEL 7.5 Repo Server
- Virtual Box running below VM's on a laptop
- Once the environment is base lined, clone or snapshot the Satellite server. Once known STIG checks are confirmed to break the system, you can quickly recover to a known good state instead of having to manually undo STIG settings. This ensures the repeatable testing process is legitimate, and the prep work is done ahead of time.
- Use security tools OpenSCAP and SCAP Workbench to create custom Red Hat Enterprise Linux 7 DISA STIG profiles to scan the system, report findings, and generate remediation scripts.
- OpenSCAP is a command line tool that has the capability to scan systems. The tool can be used by anyone. It is a quick way to get a measure against the STIG.
- SCAP Workbench is a tool set that lets you manipulate and easily customize the STIG profiles.
- Utilizing the generated remediation scripts from SCAP Workbench, I had to test out each individual STIG check to see where it failed. With a script of over 20,000+ lines of bash code, I had to comment out every line to be able to test the code check-by-check against Satellite. With roughly 243 individual STIG checks I had to go through and uncomment each check at a time. I’ve listed some VI shortcuts below.
- Comment out every line:
%s/^/#/
- Delete the # at the start of every line:
%s/^#//
- Delete the # for a range of lines:
%580,740s/^#//
- Comment out every line:
- Run a variety of tests, and see how Satellite behaves before and after the STIG is in place.
- Test cases such as Satellite software installation, Satellite software component functional testing, and product integrations with Red Hat products (i.e. Satellite to identity management), etc.
- Once you integrate with other tools (like IDM), you’ll need to test again to ensure that the STIG will not break the integrations.
- Baseline Environment via VM clones or snapshots
- Run STIG remediation script
- Disconnected Satellite Server Installation
- Organization created
- Location x2 created
- Manifest upload
- CDN changed to Repo Server
- RHEL 7Server Repo Enabled
- RHEL 7.5 Kick Start Enabled
- Product Sync
- Custom Product Created
- Test RPM uploaded to Custom Product
- Content View Created x2
- Life Cycle Configured x2
- Host Collection Created
- Activation Key Created
- Host Group Configured
- Operating System Configured
- Installation Medium Created
- Domain Configured
- Subnet Configured
- DHCP Configured
- IDM Integration for SSO/Kerberos based login
- Realm Capsule Configured
- Client Registration to Satellite
- Client Successfully Accessed repos from Satellite
- External Capsule Installation
- External Capsule Configured for dedicated Content View
- External Capsule Configured for dedicated Life Cycle
- External Capsule Content Sync
- Client Registration to External Capsule
- Client Successfully Access repos from Capsule
- Satellite & Capsule services restart
Results:
After going through this 5 step process, I have listed the OpenSCAP STIG checks that need to be disabled to allow the core set of Satellite features to function properly. You can disable these checks in SCAP Workbench and generate a clean remediation script to use to automate
Breaks Satellite (Removed all FIPS related items regardless of it did not directly impact or Satellite to avoid confusion)
- xccdf_org.ssgproject.content_rule_sshd_use_approved_ciphers
- xccdf_org.ssgproject.content_rule_sshd_use_approved_macs
- xccdf_org.ssgproject.content_rule_grub2_enable_fips_mode
- xccdf_org.ssgproject.content_rule_package_dracut-fips_installed
- xccdf_org.ssgproject.content_rule_aide_use_fips_hashes
- xccdf_org.ssgproject.content_rule_sebool_fips_mode
Breaks IDM SSO / Kerberos Integration
- xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny_root
- xccdf_org.ssgproject.content_rule_accounts_passwords_pam_faillock_deny
Needed for TFTP Provided Provisioning Services
- xccdf_org.ssgproject.content_rule_service_tftp_disabled
- xccdf_org.ssgproject.content_rule_package_tftp-server_removed
- xccdf_org.ssgproject.content_rule_tftpd_uses_secure_mode
Connect with Red Hat Services
Learn more about Red Hat Consulting
Learn more about Red Hat Training
Learn more about Red Hat Certification
Join the Red Hat Learning Community
Subscribe to the Training Newsletter
Follow Red Hat Services on Twitter
Follow Red Hat Open Innovation Labs on Twitter
Like Red Hat Services on Facebook
Watch Red Hat Training videos on YouTube
Follow Red Hat Certified Professionals on LinkedIn

저자 소개
유사한 검색 결과
Introducing OpenShift Service Mesh 3.2 with Istio’s ambient mode
Friday Five — January 30, 2026 | Red Hat
Data Security 101 | Compiler
Technically Speaking | Build a production-ready AI toolbox
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
가상화
온프레미스와 클라우드 환경에서 워크로드를 유연하게 운영하기 위한 엔터프라이즈 가상화의 미래