-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make GitLab instance CIS level 2 compliant #5990
Comments
@hannes-ucsc: "During the 2023 assessment, we were asked to perform a scan of the GitLab instance against the CIS benchmark. There were a number of level 2 findings that we ignored because r4 of FedRamp only required CIS level 2. The scan was one-shot only and we used and still are using CIS level 1 hardened AMI, which we pay a subscription fee for. Spike to investigate if there is a similar AMI that is hardened against level 2." |
CIS Amazon Linux 2 Benchmark - Level 2 Other CIS hardened images can be found here: https://www.cisecurity.org/cis-hardened-images/amazon |
Spike to test this image in |
Assignee to summarize spike results. |
Attempting to deploy the Subject: [PATCH] Make GitLab instance CIS level 2 compliant (#5990)
---
Index: terraform/gitlab/gitlab.tf.json.template.py
IDEA additional info:
Subsystem: com.intellij.openapi.diff.impl.patch.CharsetEP
<+>UTF-8
===================================================================
diff --git a/terraform/gitlab/gitlab.tf.json.template.py b/terraform/gitlab/gitlab.tf.json.template.py
--- a/terraform/gitlab/gitlab.tf.json.template.py (revision 2639f5bd9f768879e5623113b19f694d86c99686)
+++ b/terraform/gitlab/gitlab.tf.json.template.py (revision e83203fdc3055fea2b669d8ee709c079f43475ea)
@@ -239,10 +239,10 @@
# For instructions on finding the latest CIS-hardened AMI, see
# OPERATOR.rst#upgrading-linux-ami
#
-# CIS Amazon Linux 2 Kernel 4.14 Benchmark v2.0.0.29 - Level 1-4c096026-c6b0-440c-bd2f-6d34904e4fc6
+# CIS Amazon Linux 2 Benchmark v2.0.0.29 - Level 2-c41d38c4-3f6a-4434-9a86-06dd331d3f9c
#
ami_id = {
- 'us-east-1': 'ami-02adfaf34663c8edb'
+ 'us-east-1': 'ami-044f22d25234fc98b'
}
gitlab_mount = '/mnt/gitlab'
|
@hannes-ucsc: "It turns out that CIS level 2 requires |
Index: terraform/gitlab/gitlab.tf.json.template.py
IDEA additional info:
Subsystem: com.intellij.openapi.diff.impl.patch.CharsetEP
<+>UTF-8
===================================================================
diff --git a/terraform/gitlab/gitlab.tf.json.template.py b/terraform/gitlab/gitlab.tf.json.template.py
--- a/terraform/gitlab/gitlab.tf.json.template.py (revision d0713874b97e75a3413254ea566e74d346361610)
+++ b/terraform/gitlab/gitlab.tf.json.template.py (date 1710875963591)
@@ -144,7 +144,7 @@
# To then format the volume, you can then either attach it to some other Linux
# instance and format it there or use `make terraform` to create the actual
# Gitlab instance and attach the volume. For the latter you would need to ssh
-# into the Gitlab instance, format `/dev/xvdf` (`/dev/nvme1n1` on newer
+# into the Gitlab instance, format `/dev/xvdg` (`/dev/nvme2n1` on newer
# instance types) and reboot the instance. For example:
#
# docker stop gitlab-runner
@@ -152,7 +152,7 @@
# docker stop gitlab-dind
# sudo mv /mnt/gitlab /mnt/gitlab.deleteme
# sudo mkdir /mnt/gitlab
-# sudo mkfs.ext4 /dev/nvme1n1
+# sudo mkfs.ext4 /dev/nvme2n1
# sudo reboot
# sudo rm -rf /mnt/gitlab.deleteme
#
@@ -1399,7 +1399,7 @@
},
'aws_volume_attachment': {
'gitlab': {
- 'device_name': '/dev/sdf',
+ 'device_name': '/dev/sdg',
'volume_id': '${data.aws_ebs_volume.gitlab.id}',
'instance_id': '${aws_instance.gitlab.id}',
'provisioner': {
@@ -1585,7 +1585,7 @@
'user_data_replace_on_change': True,
'user_data': '#cloud-config\n' + yaml.dump({
'mounts': [
- ['/dev/nvme1n1', gitlab_mount, 'ext4', '']
+ ['/dev/nvme2n1', gitlab_mount, 'ext4', '']
],
'packages': [
'docker', |
Wait with spike until spike on #6082 is done. |
We use AWS Config and AWS Security Hub for automated management and verification of configuration settings.
The Team should configure or verify Security Hub is configured to validate the AWS account against
CIS AWS Foundations Benchmark ( CIS level 2 Benchmark). This is required for NIST SP 800 53 rev 5 Standard.
The text was updated successfully, but these errors were encountered: