Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-256953 | APWS-AT-000400 | SV-256953r903525_rule | Medium |
Description |
---|
Each Automation Controller NGINX web server's private key is used to prove the identity of the server to clients and securely exchange the shared secret key used to encrypt communications between the Automation Controller NGINX web server and clients. By gaining access to the private key, an attacker can pretend to be an authorized server and decrypt the SSL traffic between a client and the Automation Controller NGINX web server. |
STIG | Date |
---|---|
Red Hat Ansible Automation Controller Web Server Security Technical Implementation Guide | 2023-03-15 |
Check Text ( C-60628r903525_chk ) |
---|
As a System Administrator for each Automation Controller NGINX web server host, verify the location of the NGINX configuration: NGINXCONF=`nginx -V 2>&1 | tr ' ' '\n' | sed -ne '/conf-path/{s/.*conf-path=\(.*\)/\1/;p}' ` TOWER_KEY=`sed -n 's/^\s*ssl_certificate_key\s*\(.*\);/\1/p' $NGINXCONF` stat -c "%a %U %G" $TOWER_KEY| grep "600 root awx" || echo "FAILED" If "FAILED" is displayed, this is a finding. |
Fix Text (F-60570r902372_fix) |
---|
As a System Administrator for each Automation Controller NGINX web server host, set the permissions: NGINXCONF=`nginx -V 2>&1 | tr ' ' '\n' | sed -ne '/conf-path/{s/.*conf-path=\(.*\)/\1/;p}' ` TOWER_KEY=`sed -n 's/^\s*ssl_certificate_key\s*\(.*\);/\1/p' $NGINXCONF` sudo chown root:awx $TOWER_KEY sudo chmod 600 $TOWER_KEY |