Nagios and the woes of hardening
Posted: Fri Jun 28, 2024 2:16 am
Hello all,
I wanted to find out how many Sysadmins are running Nagios XI or Nagios Core in their enterprise? Then see if anyone took on the task of hardening the underlying OS with either CIS or STIG benchmarks?
A company I work for recently purchased Nagios XI and was unaware (nor I) that they do not support FIPS, fapolicyd, SELinux, or even antivirus being loaded/enabled on the system during install or product operation. (Usually technologies in builds that are “restricted” such as this, are considered an appliance and come in an ova or physical system, but not this product. You install the OS. You then install the product.)
My challenge is the company I work for, follows very strict security controls, and I don’t blame them. I’m having a hard time with any vendor who supplies a product that requires the entire OS be open in 2024, this isn’t 2010 anymore.
Nagios basically said I should get a security waiver, which I know isn’t going to happen, but on the other side my company doesn’t want to feel the waste of tens of thousands of dollars in products either.
Does anyone have any recommendations on hardening Nagios installs? I have seen their documentation on hardening Nagios itself, which is fine (SSL, Two factor authentication, and etc), but defense in depth is a requirement and they missed the mark.
I wanted to find out how many Sysadmins are running Nagios XI or Nagios Core in their enterprise? Then see if anyone took on the task of hardening the underlying OS with either CIS or STIG benchmarks?
A company I work for recently purchased Nagios XI and was unaware (nor I) that they do not support FIPS, fapolicyd, SELinux, or even antivirus being loaded/enabled on the system during install or product operation. (Usually technologies in builds that are “restricted” such as this, are considered an appliance and come in an ova or physical system, but not this product. You install the OS. You then install the product.)
My challenge is the company I work for, follows very strict security controls, and I don’t blame them. I’m having a hard time with any vendor who supplies a product that requires the entire OS be open in 2024, this isn’t 2010 anymore.
Nagios basically said I should get a security waiver, which I know isn’t going to happen, but on the other side my company doesn’t want to feel the waste of tens of thousands of dollars in products either.
Does anyone have any recommendations on hardening Nagios installs? I have seen their documentation on hardening Nagios itself, which is fine (SSL, Two factor authentication, and etc), but defense in depth is a requirement and they missed the mark.