mirror of
https://github.com/inspec/inspec
synced 2024-11-23 21:23:29 +00:00
74 lines
2 KiB
ReStructuredText
74 lines
2 KiB
ReStructuredText
|
=====================================================
|
||
|
InSpec Documentation
|
||
|
=====================================================
|
||
|
|
||
|
InSpec a collection of resources and matchers to test the compliance of your nodes. This documentation provides an introduction to this mechanism and shows how to write custom tests.
|
||
|
|
||
|
Introduction
|
||
|
-----------------------------------------------------
|
||
|
|
||
|
At first, we add our tests to the ``test`` folder. Each test file must end with ``_spec.rb``:
|
||
|
|
||
|
.. code-block:: bash
|
||
|
|
||
|
mkdir test
|
||
|
touch test/example_spec.rb
|
||
|
|
||
|
We add a rule to this file, to check the ``/tmp`` path in our system:
|
||
|
|
||
|
.. code-block:: ruby
|
||
|
|
||
|
# encoding: utf-8
|
||
|
|
||
|
rule "cis-fs-2.1" do # A unique ID for this rule
|
||
|
impact 0.7 # The criticality, if this rule fails.
|
||
|
title "Create separate /tmp partition" # A human-readable title
|
||
|
desc "An optional description..."
|
||
|
describe file('/tmp') do # The actual test
|
||
|
it { should be_mounted }
|
||
|
end
|
||
|
end
|
||
|
|
||
|
|
||
|
Let's add another spec for checking the SSH server configuration:
|
||
|
|
||
|
.. code-block:: bash
|
||
|
|
||
|
touch test/sshd_spec.rb
|
||
|
|
||
|
It will contain:
|
||
|
|
||
|
.. code-block:: ruby
|
||
|
|
||
|
# encoding: utf-8
|
||
|
|
||
|
# Skip all rules, if SSH doesn't exist on the system
|
||
|
only_if do
|
||
|
command('sshd').exists?
|
||
|
end
|
||
|
|
||
|
rule "sshd-11" do
|
||
|
impact 1.0
|
||
|
title "Server: Set protocol version to SSHv2"
|
||
|
desc "
|
||
|
Set the SSH protocol version to 2. Don't use legacy
|
||
|
insecure SSHv1 connections anymore.
|
||
|
"
|
||
|
describe sshd_config do
|
||
|
its('Protocol') { should eq('2') }
|
||
|
end
|
||
|
end
|
||
|
|
||
|
rule "sshd-7" do
|
||
|
impact 1.0
|
||
|
title "Server: Do not permit root-based login with password."
|
||
|
desc "
|
||
|
To reduce the potential to gain full privileges
|
||
|
of a system in the course of an attack (by either misconfiguration
|
||
|
or vulnerabilities), do not allow login as root with password
|
||
|
"
|
||
|
describe sshd_config do
|
||
|
its('PermitRootLogin') { should match(/no|without-password/) }
|
||
|
end
|
||
|
end
|