The STIG customization package applies STIG hardening to your AppGate ZTNA appliances. Use this customization as part of your STIG compliance workflow for a seeded appliance.
Installing the Customization
To install the customization, complete the following steps:
Sign in to the AppGate admin UI.
Upload the
.zippackage to the Appliance Customizations page (System > Appliance Customizations).Apply the customization to each appliance where STIG settings must be applied (System > Appliances > Miscellaneous settings).
View cz-stig commands
To view available commands:
SSH in to the appliance.
Run
man cz-stig. Use these options to further harden the appliance if necessary.
NOTE
The following optional commands can have a negative effect on user experience or system performance. It is not recommended to use these commands unless you must use them for compliance reasons.
Enable |
|
Enable |
|
Set issue string |
|
Lock single user and maintenance mode |
|
Set password even in cloud environments | Run
|
Denylist USB storage kernel module |
|
Changes to harden the SSH configuration |
|
Optional Configurations
You can make further customizations by configuring the following lines in /data/settings.config:
Line 2: Edit the expected underlying OS value.
Line 3: Change the error message text.
Packaging Changes
If you modify the package contents under src/, ensure the zip structure is correct.
Required layout:
folder.zip
start
status
stop
data/...Tailoring Profile
A SCAP tailoring file is included in the customization repository to control which findings are selected during scanning. You can mark findings as Not selected in the tailoring file to exclude them from checks.
The file CAN_Ubuntu_24-04_STIG001.003.005MAC-2_Public_tailored_tailoring.xml is used by internal scans to achieve the advertised score.
Justifications for exclusions specified in this file are outlined in a separate attestation. Contact an AppGate ZTNA representative to obtain a copy.