Module/Rule.WebConfigurationProperty/Convert/WebConfigurationPropertyRule.Convert.psm1

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License.
using module .\..\..\Common\Common.psm1
using module .\..\WebConfigurationPropertyRule.psm1

$exclude = @($MyInvocation.MyCommand.Name,'Template.*.txt')
$supportFileList = Get-ChildItem -Path $PSScriptRoot -Exclude $exclude
foreach ($supportFile in $supportFileList)
{
    Write-Verbose "Loading $($supportFile.FullName)"
    . $supportFile.FullName
}
# Header

<#
    .SYNOPSIS
        Convert the contents of an xccdf check-content element into a
        WebConfigurationPropertyRule object
    .DESCRIPTION
        The WebConfigurationPropertyRule class is used to extract the web
        configuration settings from the check-content of the xccdf. Once a STIG
        rule is identified as a web configuration property rule, it is passed
        to the WebConfigurationPropertyRule class for parsing and validation.
#>

class WebConfigurationPropertyRuleConvert : WebConfigurationPropertyRule
{
    <#
        .SYNOPSIS
            Empty constructor for SplitFactory
    #>

    WebConfigurationPropertyRuleConvert ()
    {
    }

    <#
        .SYNOPSIS
            Converts a xccdf STIG rule element into a Web Configuration Property Rule
        .PARAMETER XccdfRule
            The STIG rule to convert
    #>

    WebConfigurationPropertyRuleConvert ([xml.xmlelement] $XccdfRule) : base ($XccdfRule, $true)
    {
        $this.SetConfigSection()
        $this.SetKeyValuePair()

        if ($this.IsOrganizationalSetting())
        {
            $this.SetOrganizationValueTestString()
        }

        if ($this.conversionstatus -eq 'pass')
        {
            $this.SetDuplicateRule()
        }

        $this.SetDscResource()
    }

    #region Methods

    <#
        .SYNOPSIS
            Extracts the config section from the check-content and sets the value
        .DESCRIPTION
            Gets the config section from the xccdf content and sets the value.
            If the section that is returned is not valid, the parser status is
            set to fail.
    #>

    [void] SetConfigSection ()
    {
        $thisConfigSection = Get-ConfigSection -CheckContent $this.SplitCheckContent

        if (-not $this.SetStatus($thisConfigSection))
        {
            $this.set_ConfigSection($thisConfigSection)
        }
    }

    <#
        .SYNOPSIS
            Extracts the key value pair from the check-content and sets the value
        .DESCRIPTION
            Gets the key value pair from the xccdf content and sets the value.
            If the value that is returned is not valid, the parser status is
            set to fail.
    #>

    [void] SetKeyValuePair ()
    {
        $thisKeyValuePair = Get-KeyValuePair -CheckContent $this.SplitCheckContent

        if (-not $this.SetStatus($thisKeyValuePair))
        {
            $this.set_Key($thisKeyValuePair.Key)
            $this.set_Value($thisKeyValuePair.Value)
        }
    }

    <#
        .SYNOPSIS
            Tests if and organizational value is required
        .DESCRIPTION
            Tests if and organizational value is required
    #>

    [Boolean] IsOrganizationalSetting ()
    {
        if (-not [String]::IsNullOrEmpty($this.key) -and [String]::IsNullOrEmpty($this.value))
        {
            return $true
        }
        else
        {
            return $false
        }
    }

    <#
        .SYNOPSIS
            Set the organizational value
        .DESCRIPTION
            Extracts the organizational value from the key and then sets the value
    #>

    [void] SetOrganizationValueTestString ()
    {
        $thisOrganizationValueTestString = Get-WebConfigOrganizationValueTestString -Key $this.key

        if (-not $this.SetStatus($thisOrganizationValueTestString))
        {
            $this.set_OrganizationValueTestString($thisOrganizationValueTestString)
            $this.set_OrganizationValueRequired($true)
        }
    }

    hidden [void] SetDscResource ()
    {
        if ($null -eq $this.DuplicateOf)
        {
            $this.DscResource = 'xWebConfigKeyValue'
        }
        else
        {
            $this.DscResource = 'None'
        }
    }

    static [bool] Match ([string] $CheckContent)
    {
        if
        (
            $CheckContent -Match '\.NET Trust Level' -or
            (
                $CheckContent -Match 'IIS 8\.5 web|IIS 10\.0 web' -and
                $CheckContent -NotMatch 'document'
            ) -and
            (
                $CheckContent -NotMatch 'alternateHostName' -and
                $CheckContent -NotMatch 'Application Pools' -and
                $CheckContent -NotMatch 'bindings' -and
                $CheckContent -NotMatch 'DoD PKI Root CA' -and
                $CheckContent -NotMatch 'IUSR account' -and
                $CheckContent -NotMatch 'Logging' -and
                $CheckContent -NotMatch 'MIME Types' -and
                $CheckContent -NotMatch 'Physical Path' -and
                $CheckContent -NotMatch 'script extensions' -and
                $CheckContent -NotMatch 'recycl' -and
                $CheckContent -NotMatch 'WebDAV' -and
                $CheckContent -NotMatch 'Review the local users' -and
                $CheckContent -NotMatch 'System Administrator' -and
                $CheckContent -NotMatch 'are not restrictive enough to prevent connections from nonsecure zones' -and
                $CheckContent -NotMatch 'verify the certificate path is to a DoD root CA' -and
                $CheckContent -NotMatch 'HKLM' -and
                $CheckContent -NotMatch 'Authorization Rules' -and
                $CheckContent -NotMatch 'regedit <enter>' -and
                $CheckContent -NotMatch 'Enable proxy' -and
                $CheckContent -NotMatch 'SSL Settings' -and
                $CheckContent -NotMatch 'Strict-Transport-Security'
            )
        )
        {
            return $true
        }
        return $false
    }

    <#
        .SYNOPSIS
            Tests if a rule contains multiple checks
        .DESCRIPTION
            Search the rule text to determine if multiple web configurations are defined
        .PARAMETER CheckContent
            The rule text from the check-content element in the xccdf
    #>

    <#{TODO}#> # HasMultipleRules is implemented inconsistently.
    static [bool] HasMultipleRules ([string] $CheckContent)
    {
        return Test-MultipleWebConfigurationPropertyRule -CheckContent ([WebConfigurationPropertyRule]::SplitCheckContent($CheckContent))
    }

    <#
        .SYNOPSIS
            Splits a rule into multiple checks
        .DESCRIPTION
            Once a rule has been found to have multiple checks, the rule needs
            to be split. This method splits a web configuration into multiple rules.
            Each split rule id is appended with a dot and letter to keep reporting
            per the ID consistent. An example would be is V-1000 contained 2
            checks, then SplitMultipleRules would return 2 objects with rule ids
            V-1000.a and V-1000.b
        .PARAMETER CheckContent
            The rule text from the check-content element in the xccdf
    #>

    static [string[]] SplitMultipleRules ([string] $CheckContent)
    {
        return (Split-MultipleWebConfigurationPropertyRule -CheckContent ([WebConfigurationPropertyRule]::SplitCheckContent($CheckContent)))
    }

    #endregion
}