~/f/scap-security-guide/RPMS.2017 ~/f/scap-security-guide
~/f/scap-security-guide
RPMS.2017/scap-security-guide-0.1.62-0.0.noarch.rpm RPMS/scap-security-guide-0.1.62-0.0.noarch.rpm differ: byte 225, line 1
Comparing scap-security-guide-0.1.62-0.0.noarch.rpm to scap-security-guide-0.1.62-0.0.noarch.rpm
comparing the rpm tags of scap-security-guide
--- old-rpm-tags
+++ new-rpm-tags
@@ -191,4 +191,4 @@
-/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 23419275ccbd79da432753a3728f64c87160cbe11926e3cb764d009653e7b918 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 5f7a423a88f6ae317c8b2f886e43b2f3c0e0fb126bb798dbe1735f4fc700c49c 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html 407704b9494345469ab620c9028cedb17b2433538d574e2ac33b1e61b82183bd 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 24c74a090eabecf17c0c2e3f92a1442c640a230811f7f7deba62e27cd0ee4b04 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 6f06da30a8e9caf0a02ce351d32005e20d5653c2bff869645c296197e3362c3a 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 6921cdd4e4960b2738918330f0d6f85916fd6a83ca4a31ff32c0f87171031b8e 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html edb8209654977cf83f532de079a5579c9e5d65ad67f9da787a8a52fa158b07c4 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html ee9eb8f58b51d1f7f04272d761233e88be43f11858bf7104e5024e88478207f5 2
@@ -197,7 +197,7 @@
-/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html 4524e12092930ee9b7a8d29901108fea1e2d774f4569e3782d710da957555c05 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minmal.html 14e528c62f7a6c69e85b11978b4b58d14f928bfd4053e06cafc7584b6bcd592d 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html 1ed16b9d855b0ca115003285e8724a48fc8595cb6ee5328332da3d4df8b2832b 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html f373e4bc2bdd0fbb88209ff9a5a9e20436fc702d1177f4918462e95726bc7bb9 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html 5ea2ddf070b182422460445ed030f76de0272710dbda43498c250cf2e338e8e7 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 016c0766cdf85fefcc939247ec1a2b6226039617ef91fe0b44075df504f6e9f9 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html f9534b0c4e1780febdba6211737d26c1ccf50ebcacc2b5e4f06dcb3b1ba7de52 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-stig.html 507cf34e91323b50ff80ebdc98fc280c13c5ba2a107b2fee9c017fd1fe71519e 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-anssi_bp28_minmal.html c9386ef710d84adb6c9b6d2b8953c37864faaec9c75245c821c1f1e1135e5775 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html b0b80318717ab4a75a33decdc4b94dcf5f9daff5f810e1c187d3dda9274efd00 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html ae3c56c649894eecef4918681fd5878075a6374fd954caa10fa58368e854a1ab 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html d794bf1f254b5fd89aeed2bf6180c80d28ca4fe4134aa5d53ac19611f612b086 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html e5def4cd542af7508c746317463088261e69d620ba2fa3d76491efa4f2e9f0fe 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html e3a48590655c29c9b6eb9be52a598120e79a2d63e9cad38be353faf2900dc228 2
@@ -205,3 +205,3 @@
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss.html e0e06ab043551dfe4de0f38618462d627550be9512490f23ca389c2a1a95532a 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 22f30bf084bb5d1cd2a51d8d6dad3d5de914510bf588ce295de3bd2114c59044 2
-/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 0ed43f31930c4d4432853797261405b52ce4d1b75ede3fcd2da22ed526ae259c 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss.html 5f4e186ba0795f828a65327f901856f6b0288ffee2e2f0e1c81912ef0f8db4f8 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html d7baf48cf5ffa61e1a42022440d38584b0ecb9b4a60af90f4c03a8edcee38e53 2
+/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html dd613e1cebc72f4ba9060f396244f2017d2e22ae63a98fb8ee712e1271bbc0f4 2
@@ -259,3 +259,3 @@
-/usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml fdd0968b10e8e5b89a739bd2faa0c68ae7a2cc2e22ed87dcefcdc6b0797eec22 0
-/usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 312806a948e3bbe253d474719c010ce97cc5dee471414782099480252b3c8a53 0
-/usr/share/xml/scap/ssg/content/ssg-opensuse-ocil.xml 8d5cad78524b66b2750dd03ac058a864f69a458e0d21981f7107580db31e0b4d 0
+/usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml 411d5f19f701f4c757f3d6ce0124dd0ecfd88d69d72dd9574960dcacf7263357 0
+/usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 427932554997a45550e178adbf549e69332976e8f119e8e22d5c8de1a68e658b 0
+/usr/share/xml/scap/ssg/content/ssg-opensuse-ocil.xml 14c4ffa931b88074d75f28412e1f130686473d99848132daf3f434c52a9b0c2f 0
@@ -263 +263 @@
-/usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 0a0f5b5e8c95dfbcc290a8d8102d6401ead3f06857ad1cc3f86195f9f9cb4923 0
+/usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 915862667e048a5423b3c8dd6434f2508895b9c36b878f4c2f7cbcae517b2b18 0
@@ -266,3 +266,3 @@
-/usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml 0aa9d52b4d79ff22163e98c2c5d5d37e603d127c0557b37040c5e8db754c9919 0
-/usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 5f88ae1d25b43a324b2082c672face1228f1eb2ab257e4421f800655ea0701b6 0
-/usr/share/xml/scap/ssg/content/ssg-sle12-ocil.xml 45112817d51d100b5c76220877292b3c5294f42d10b1dc72990c4b048e5ddd85 0
+/usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml 8e30a594b50f610df7c03f6b027b2b30199fcc2bca26165e30e585b4a090e1c8 0
+/usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 5029ed9c5cc909d7abdd85f834aeed5f83e21f2e2dcde2e9c742faadd60271a6 0
+/usr/share/xml/scap/ssg/content/ssg-sle12-ocil.xml 99e0e39c305655029eb01e85d2854ca65b7fd72d9aaf591f0dbbcc8b11e1dd16 0
@@ -270 +270 @@
-/usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml 76b35c1d03a783f40712c98b62bcafee3d26f7cd62d20a523efbf70f243ee54a 0
+/usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml fc5065b85a5a9ededfe1f10c8c031646265747a7b4e0b30ed243310f4c8706c4 0
@@ -273,3 +273,3 @@
-/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 49018beb1b2b8863f4bd22c6b913c5d0bfebbbbc6acb006d94d6a65dc3955052 0
-/usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml c7b37c78f540aee332244b67f4b1ba810bf47834cef67b87f4e33a266cd843ae 0
-/usr/share/xml/scap/ssg/content/ssg-sle15-ocil.xml 42618f51f862c1d3107534fa10c35df2ca6735b68beedd2e08213c30a7bee46f 0
+/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml e285e9a29bdffbf4577672eca33c5856c1a2c9ce33934ad24ac704669f639387 0
+/usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml e15a88d7db081adb8ddda26fc384edca2afbdf3c512bbe670634748096deb235 0
+/usr/share/xml/scap/ssg/content/ssg-sle15-ocil.xml ff14587056b9edb15247a099a03440255149f1d29af6ff4eb25f906f1b89ee92 0
@@ -277 +277 @@
-/usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml 069aca48020c60ae925e3cdc9ba6ab0368dd915278e9ed8f89605f1e9daa6290 0
+/usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml ba99c1c7a0d1fced437305579385ccfc80144c74ea2d7adda5c5047a77af835d 0
comparing rpmtags
comparing RELEASE
comparing PROVIDES
comparing scripts
comparing filelist
comparing file checksum
creating rename script
RPM file checksum differs.
Extracting packages
/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -577,17 +577,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -34239,17 +34239,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -34298,10 +34298,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -34309,6 +34306,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -34667,17 +34667,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -34971,17 +34971,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -35013,10 +35013,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -35024,6 +35021,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -35128,10 +35128,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["iptables"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
class enable_iptables {
service {'iptables':
@@ -35139,6 +35136,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["iptables"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service iptables
block:
@@ -35176,17 +35176,17 @@
masquerading, etc.
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_iptables_installed |
Identifiers and References | References:
CM-6(a), SRG-OS-000480-GPOS-00227, 3.5.1.1 |
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "iptables"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -529,17 +529,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4234,17 +4234,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -4538,17 +4538,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4580,10 +4580,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4591,6 +4588,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -4695,10 +4695,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["iptables"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
class enable_iptables {
service {'iptables':
@@ -4706,6 +4703,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["iptables"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service iptables
block:
@@ -4743,17 +4743,17 @@
masquerading, etc.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_iptables_installed |
Identifiers and References | References:
CM-6(a), SRG-OS-000480-GPOS-00227, 3.5.1.1 |
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "iptables"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "iptables"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure iptables is installed
package:
name: iptables
@@ -8814,10 +8814,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -8825,6 +8822,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -11290,10 +11290,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["avahi-daemon"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_avahi-daemon
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_avahi-daemon
class disable_avahi-daemon {
service {'avahi-daemon':
@@ -11301,6 +11298,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -529,17 +529,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4234,17 +4234,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -4538,17 +4538,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4580,10 +4580,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4591,6 +4588,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -4695,10 +4695,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["iptables"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
class enable_iptables {
service {'iptables':
@@ -4706,6 +4703,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["iptables"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service iptables
block:
@@ -4743,17 +4743,17 @@
masquerading, etc.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_iptables_installed |
Identifiers and References | References:
CM-6(a), SRG-OS-000480-GPOS-00227, 3.5.1.1 |
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "iptables"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "iptables"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure iptables is installed
package:
name: iptables
@@ -11206,10 +11206,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["cron"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
class enable_cron {
service {'cron':
@@ -11217,6 +11214,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["cron"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service cron
block:
@@ -12272,10 +12272,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["rpcbind"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rpcbind
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rpcbind
class disable_rpcbind {
service {'rpcbind':
@@ -12283,6 +12280,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
/usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle12-guide-cis_workstation_l2.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -577,17 +577,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -34239,17 +34239,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -34298,10 +34298,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -34309,6 +34306,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -34667,17 +34667,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -34971,17 +34971,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -35013,10 +35013,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -35024,6 +35021,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -35128,10 +35128,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["iptables"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_iptables
class enable_iptables {
service {'iptables':
@@ -35139,6 +35136,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["iptables"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service iptables
block:
@@ -35176,17 +35176,17 @@
masquerading, etc.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_iptables_installed |
Identifiers and References | References:
CM-6(a), SRG-OS-000480-GPOS-00227, 3.5.1.1 |
|
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "kbd"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "kbd"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
class install_kbd {
package { 'kbd':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "kbd"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure kbd is installed
package:
name: kbd
@@ -49525,17 +49525,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit-audispd-plugins
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit-audispd-plugins
class install_audit-audispd-plugins {
package { 'audit-audispd-plugins':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit-audispd-plugins"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit-audispd-plugins is installed
package:
name: audit-audispd-plugins
@@ -49563,17 +49563,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -49622,10 +49622,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -49633,6 +49630,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -49746,17 +49746,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -49820,10 +49820,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["apparmor"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_apparmor
class enable_apparmor {
service {'apparmor':
@@ -49831,6 +49828,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["apparmor"]
Remediation Ansible snippet ⇲- name: Start apparmor.service
systemd:
name: apparmor.service
@@ -52229,17 +52229,17 @@
CCE-83157-8References:
CCI-000382, CCI-002080, CCI-002314, CM-7, CA-3(5), AC-17(1), SRG-OS-000420-GPOS-00186, SRG-OS-000096-GPOS-00050, SLES-12-030030, SV-217261r603262_rule
|
|
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "dnf-automatic"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4363,17 +4363,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4407,10 +4407,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4418,6 +4415,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -583,17 +583,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -34640,17 +34640,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -34699,10 +34699,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -34710,6 +34707,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -35064,17 +35064,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -35759,17 +35759,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -35803,10 +35803,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -35814,6 +35811,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -35959,17 +35959,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -36007,10 +36007,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -36018,6 +36015,9 @@
ensure => 'running',
}
}
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -535,17 +535,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4565,17 +4565,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -5260,17 +5260,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5304,10 +5304,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5315,6 +5312,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -5460,17 +5460,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -5508,10 +5508,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5519,6 +5516,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -5708,17 +5708,17 @@
masquerading, etc.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_iptables_installed |
Identifiers and References | References:
CM-6(a), SRG-OS-000480-GPOS-00227, 3.5.3.1.1 |
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "iptables"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "iptables"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure iptables is installed
package:
name: iptables
@@ -9873,10 +9873,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -9884,6 +9881,9 @@
ensure => 'stopped',
}
}
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -535,17 +535,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4565,17 +4565,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -5260,17 +5260,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5304,10 +5304,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5315,6 +5312,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -5460,17 +5460,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -5508,10 +5508,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5519,6 +5516,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -5708,17 +5708,17 @@
masquerading, etc.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_iptables_installed |
Identifiers and References | References:
CM-6(a), SRG-OS-000480-GPOS-00227, 3.5.3.1.1 |
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "iptables"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "iptables"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure iptables is installed
package:
name: iptables
@@ -12324,10 +12324,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["cron"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
class enable_cron {
service {'cron':
@@ -12335,6 +12332,9 @@
ensure => 'running',
}
}
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-cis_workstation_l2.html 2022-07-15 00:00:00.000000000 +0000
@@ -123,17 +123,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -583,17 +583,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -34640,17 +34640,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -34699,10 +34699,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -34710,6 +34707,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -35064,17 +35064,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -35759,17 +35759,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -35803,10 +35803,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -35814,6 +35811,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -35959,17 +35959,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -36007,10 +36007,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -36018,6 +36015,9 @@
ensure => 'running',
}
}
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-hipaa.html 2022-07-15 00:00:00.000000000 +0000
@@ -1376,10 +1376,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -1387,6 +1384,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -44078,10 +44078,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -44089,6 +44086,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -44784,10 +44784,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -44795,6 +44792,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -45906,10 +45906,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["kdump"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_kdump
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_kdump
class disable_kdump {
service {'kdump':
@@ -45917,6 +45914,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["kdump"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service kdump
block:
@@ -46012,10 +46012,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["cron"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
class enable_cron {
service {'cron':
@@ -46023,6 +46020,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["cron"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service cron
block:
@@ -46223,10 +46223,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["xinetd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_xinetd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_xinetd
class disable_xinetd {
service {'xinetd':
@@ -46234,6 +46231,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["xinetd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service xinetd
block:
@@ -46380,10 +46380,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["rexec"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rexec
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rexec
class disable_rexec {
service {'rexec':
@@ -46391,6 +46388,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["rexec"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service rexec
block:
@@ -46497,10 +46497,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["rlogin"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rlogin
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rlogin
class disable_rlogin {
service {'rlogin':
@@ -46508,6 +46505,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["rlogin"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service rlogin
block:
@@ -46852,10 +46852,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["telnet"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_telnet
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_telnet
class disable_telnet {
service {'telnet':
@@ -46863,6 +46860,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["telnet"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service telnet
block:
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -400,17 +400,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4310,10 +4310,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["pcscd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
class enable_pcscd {
service {'pcscd':
@@ -4321,6 +4318,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["pcscd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service pcscd
block:
@@ -37780,17 +37780,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit-audispd-plugins
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit-audispd-plugins
class install_audit-audispd-plugins {
package { 'audit-audispd-plugins':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit-audispd-plugins"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit-audispd-plugins is installed
package:
name: audit-audispd-plugins
@@ -37832,10 +37832,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -37843,6 +37840,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -38500,17 +38500,17 @@
CCE-85836-5References:
12, 15, 3, 5, 8, APO13.01, DSS01.04, DSS05.02, DSS05.03, DSS05.04, CCI-001130, CCI-001131, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, SR 1.13, SR 2.6, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 7.1, SR 7.6, A.11.2.4, A.11.2.6, A.13.1.1, A.13.2.1, A.14.1.3, A.15.1.1, A.15.2.1, A.6.2.1, A.6.2.2, CM-6(a), PR.AC-3, PR.MA-2, PR.PT-4, Req-4.1, SRG-OS-000480-GPOS-00227, SRG-OS-000120-GPOS-00061
|
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "strongswan"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "strongswan"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_strongswan
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_strongswan
class install_strongswan {
package { 'strongswan':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "strongswan"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure strongswan is installed
package:
name: strongswan
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-standard.html 2022-07-15 00:00:00.000000000 +0000
@@ -24342,17 +24342,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -24401,10 +24401,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -24412,6 +24409,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -24776,17 +24776,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -24820,10 +24820,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -24831,6 +24828,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -24976,17 +24976,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -28496,17 +28496,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "cron"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_cron
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_cron
class install_cron {
package { 'cron':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "cron"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure cron is installed
package:
name: cron
@@ -28541,10 +28541,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["cron"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_cron
class enable_cron {
service {'cron':
@@ -28552,6 +28549,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["cron"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service cron
block:
@@ -28818,10 +28818,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["httpd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_httpd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_httpd
class disable_httpd {
service {'httpd':
@@ -28829,6 +28826,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["httpd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service httpd
block:
@@ -28962,17 +28962,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "ntp"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_ntp
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_ntp
class install_ntp {
package { 'ntp':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
/usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sle15-guide-stig.html 2022-07-15 00:00:00.000000000 +0000
@@ -119,17 +119,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲ |
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
zypper install -y "kbd"
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "kbd"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
class install_kbd {
package { 'kbd':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "kbd"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure kbd is installed
package:
name: kbd
@@ -53766,17 +53766,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit-audispd-plugins
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit-audispd-plugins
class install_audit-audispd-plugins {
package { 'audit-audispd-plugins':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit-audispd-plugins"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit-audispd-plugins is installed
package:
name: audit-audispd-plugins
@@ -53803,17 +53803,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audit"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audit
class install_audit {
package { 'audit':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audit"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audit is installed
package:
name: audit
@@ -53862,10 +53862,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["auditd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_auditd
class enable_auditd {
service {'auditd':
@@ -53873,6 +53870,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["auditd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Gather the package facts
package_facts:
manager: auto
@@ -53976,17 +53976,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_apparmor"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_apparmor
class install_pam_apparmor {
package { 'pam_apparmor':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_apparmor"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pam_apparmor is installed
package:
name: pam_apparmor
@@ -54050,10 +54050,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["apparmor"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_apparmor
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_apparmor
class enable_apparmor {
service {'apparmor':
@@ -54061,6 +54058,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["apparmor"]
Remediation Ansible snippet ⇲- name: Start apparmor.service
systemd:
name: apparmor.service
@@ -54458,17 +54458,17 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -54506,10 +54506,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -54517,6 +54514,9 @@
ensure => 'running',
}
}
/usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -151,19 +151,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -176,14 +166,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -191,34 +186,39 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -226,9 +226,9 @@
-
+
-
+
@@ -2411,11 +2411,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -2424,6 +2419,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -2455,11 +2455,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -2468,6 +2463,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -5267,11 +5267,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
class install_audit-audispd-plugins {
@@ -5280,6 +5275,11 @@
}
}
+
+[[packages]]
+name = "audit-audispd-plugins"
+version = "*"
+
- name: Ensure audit-audispd-plugins is installed
package:
name: audit-audispd-plugins
@@ -5352,11 +5352,6 @@
SRG-OS-000475-GPOS-00220
The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy.
-
-[[packages]]
-name = "audit"
-version = "*"
-
include install_audit
class install_audit {
@@ -5365,6 +5360,11 @@
}
}
/usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -151,19 +151,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -176,14 +166,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -191,34 +186,39 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -226,9 +226,9 @@
-
+
-
+
@@ -2411,11 +2411,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -2424,6 +2419,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -2455,11 +2455,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -2468,6 +2463,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -5267,11 +5267,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
class install_audit-audispd-plugins {
@@ -5280,6 +5275,11 @@
}
}
+
+[[packages]]
+name = "audit-audispd-plugins"
+version = "*"
+
- name: Ensure audit-audispd-plugins is installed
package:
name: audit-audispd-plugins
@@ -5352,11 +5352,6 @@
SRG-OS-000475-GPOS-00220
The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy.
-
-[[packages]]
-name = "audit"
-version = "*"
-
include install_audit
class install_audit {
@@ -5365,6 +5360,11 @@
}
}
/usr/share/xml/scap/ssg/content/ssg-opensuse-ocil.xml differs (XML 1.0 document, ASCII text)
--- old//usr/share/xml/scap/ssg/content/ssg-opensuse-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,256 +7,250 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Require modules to be validly signed
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Verify User Who Owns group File
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Harden SSH client Crypto Policy
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Verify Only Root Has UID 0
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Enable Use of Strict Mode Checking
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-sshd_enable_strictmodes_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Configure auditd max_log_file_action Upon Reaching Maximum Log Size
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1
-
- Allow Only SSH Protocol 2
+
+ Enable the NTP Daemon
- ocil:ssg-sshd_allow_only_protocol2_action:testaction:1
+ ocil:ssg-service_ntpd_enabled_action:testaction:1
-
- Ensure syslog-ng is Installed
+
+ Prefer to use a 64-bit Operating System when supported
- ocil:ssg-package_syslogng_installed_action:testaction:1
+ ocil:ssg-prefer_64bit_os_action:testaction:1
-
- Specify the hash to use when signing modules
+
+ Verify that System Executables Have Root Ownership
- ocil:ssg-kernel_config_module_sig_hash_action:testaction:1
+ ocil:ssg-file_ownership_binary_dirs_action:testaction:1
-
- Enable Randomized Layout of Virtual Address Space
+
+ Ensure SSH LoginGraceTime is configured
- ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1
+ ocil:ssg-sshd_set_login_grace_time_action:testaction:1
-
- Verify User Who Owns passwd File
+
+ Disable Accepting Packets Routed Between Local Interfaces
- ocil:ssg-file_owner_etc_passwd_action:testaction:1
+ ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
- Set SSH Client Alive Count Max
+
+ Verify User Who Owns Backup passwd File
- ocil:ssg-sshd_set_keepalive_action:testaction:1
+ ocil:ssg-file_owner_backup_etc_passwd_action:testaction:1
-
- Ensure rsyslog is Installed
+
+ Add nosuid Option to /dev/shm
- ocil:ssg-package_rsyslog_installed_action:testaction:1
+ ocil:ssg-mount_option_dev_shm_nosuid_action:testaction:1
-
- Add nodev Option to /dev/shm
+
+ Ensure Logrotate Runs Periodically
- ocil:ssg-mount_option_dev_shm_nodev_action:testaction:1
+ ocil:ssg-ensure_logrotate_activated_action:testaction:1
-
- Verify User Who Owns gshadow File
+
+ Ensure /var Located On Separate Partition
- ocil:ssg-file_owner_etc_gshadow_action:testaction:1
+ ocil:ssg-partition_for_var_action:testaction:1
/usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-opensuse-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,19 +43,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -68,14 +58,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -83,34 +78,39 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -118,9 +118,9 @@
-
+
-
+
@@ -2303,11 +2303,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -2316,6 +2311,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -2347,11 +2347,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -2360,6 +2355,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -5159,11 +5159,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
class install_audit-audispd-plugins {
@@ -5172,6 +5167,11 @@
}
}
+
+[[packages]]
+name = "audit-audispd-plugins"
+version = "*"
+
- name: Ensure audit-audispd-plugins is installed
package:
name: audit-audispd-plugins
@@ -5244,11 +5244,6 @@
SRG-OS-000475-GPOS-00220
The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy.
-
-[[packages]]
-name = "audit"
-version = "*"
-
include install_audit
class install_audit {
@@ -5257,6 +5252,11 @@
}
}
/usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle12-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -151,44 +151,45 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -196,45 +197,44 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -242,9 +242,9 @@
-
+
-
+
@@ -3169,11 +3169,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -3182,6 +3177,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -6300,11 +6300,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "sudo"
-version = "*"
-
include install_sudo
class install_sudo {
@@ -6313,6 +6308,11 @@
}
}
+
+[[packages]]
+name = "sudo"
+version = "*"
+
- name: Ensure sudo is installed
package:
name: sudo
@@ -7770,11 +7770,6 @@
zypper install -y "gnutls-utils"
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
/usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle12-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -153,44 +153,45 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -198,45 +199,44 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -244,9 +244,9 @@
-
+
-
+
@@ -3171,11 +3171,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -3184,6 +3179,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -6302,11 +6302,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "sudo"
-version = "*"
-
include install_sudo
class install_sudo {
@@ -6315,6 +6310,11 @@
}
}
+
+[[packages]]
+name = "sudo"
+version = "*"
+
- name: Ensure sudo is installed
package:
name: sudo
@@ -7772,11 +7772,6 @@
zypper install -y "gnutls-utils"
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
/usr/share/xml/scap/ssg/content/ssg-sle12-ocil.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle12-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle12-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,514 +7,508 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Record Any Attempts to Run chacl
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-audit_rules_execution_chacl_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Add noexec Option to /var/tmp
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
-
- Require Authentication for Emergency Systemd Target
+
+ Install sudo Package
- ocil:ssg-require_emergency_target_auth_action:testaction:1
+ ocil:ssg-package_sudo_installed_action:testaction:1
-
- Add noexec Option to /var/tmp
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Prevent remote hosts from connecting to the proxy display
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-sshd_x11_use_localhost_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
+
+ Remove Default Configuration to Disable Syscall Auditing
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1
+ ocil:ssg-audit_rules_enable_syscall_auditing_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Uninstall Samba Package
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-package_samba_removed_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Require modules to be validly signed
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Configure auditd space_left on Low Disk Space
+
+ Require Authentication for Single User Mode
- ocil:ssg-auditd_data_retention_space_left_action:testaction:1
+ ocil:ssg-require_singleuser_auth_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ The operating system must restrict privilege elevation to authorized personnel
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-sudo_restrict_privilege_elevation_to_authorized_action:testaction:1
-
- Verify User Who Owns group File
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Harden SSH client Crypto Policy
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Uninstall squid Package
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-package_squid_removed_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Verify Only Root Has UID 0
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Encrypt Audit Records Sent With audispd Plugin
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1
-
- Set Password Hashing Algorithm in /etc/login.defs
+
+ Verify Group Who Owns SSH Server config file
- ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1
+ ocil:ssg-file_groupowner_sshd_config_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Make sure that the dconf databases are up-to-date with regards to respective keyfiles
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-dconf_db_up_to_date_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Install strongswan Package
+
+ Configure Notification of Post-AIDE Scan Details
- ocil:ssg-package_strongswan_installed_action:testaction:1
+ ocil:ssg-aide_scan_notification_action:testaction:1
/usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle12-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,44 +43,45 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -88,45 +89,44 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -134,9 +134,9 @@
-
+
-
+
@@ -3061,11 +3061,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -3074,6 +3069,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -6192,11 +6192,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "sudo"
-version = "*"
-
include install_sudo
class install_sudo {
@@ -6205,6 +6200,11 @@
}
}
+
+[[packages]]
+name = "sudo"
+version = "*"
+
- name: Ensure sudo is installed
package:
name: sudo
@@ -7662,11 +7662,6 @@
zypper install -y "gnutls-utils"
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
/usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle15-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -163,14 +163,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -178,90 +183,85 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -269,9 +269,9 @@
-
+
-
+
@@ -4875,11 +4875,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -4888,6 +4883,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -8824,11 +8824,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "sudo"
-version = "*"
-
include install_sudo
class install_sudo {
@@ -8837,6 +8832,11 @@
}
/usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle15-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -165,14 +165,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -180,90 +185,85 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -271,9 +271,9 @@
-
+
-
+
@@ -4877,11 +4877,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -4890,6 +4885,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -8826,11 +8826,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "sudo"
-version = "*"
-
include install_sudo
class install_sudo {
@@ -8839,6 +8834,11 @@
}
/usr/share/xml/scap/ssg/content/ssg-sle15-ocil.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle15-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle15-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,1054 +7,1054 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Record Any Attempts to Run chacl
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-audit_rules_execution_chacl_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Add noexec Option to /var/tmp
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Install sudo Package
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-package_sudo_installed_action:testaction:1
-
- Require Authentication for Emergency Systemd Target
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-require_emergency_target_auth_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Add noexec Option to /var/tmp
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Verify Any Configured IPSec Tunnel Connections
+
+ Remove Default Configuration to Disable Syscall Auditing
- ocil:ssg-libreswan_approved_tunnels_action:testaction:1
+ ocil:ssg-audit_rules_enable_syscall_auditing_action:testaction:1
-
- Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
+
+ Uninstall Samba Package
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1
+ ocil:ssg-package_samba_removed_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Require modules to be validly signed
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Require Authentication for Single User Mode
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-require_singleuser_auth_action:testaction:1
-
- Configure auditd space_left on Low Disk Space
+
+ The operating system must restrict privilege elevation to authorized personnel
- ocil:ssg-auditd_data_retention_space_left_action:testaction:1
+ ocil:ssg-sudo_restrict_privilege_elevation_to_authorized_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Verify User Who Owns group File
+
+ Harden SSH client Crypto Policy
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Uninstall squid Package
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-package_squid_removed_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Verify Only Root Has UID 0
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Ensure SELinux Not Disabled in the kernel arguments
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-coreos_enable_selinux_kernel_argument_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Encrypt Audit Records Sent With audispd Plugin
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1
-
- Set Password Hashing Algorithm in /etc/login.defs
+
+ Verify Group Who Owns SSH Server config file
- ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1
+ ocil:ssg-file_groupowner_sshd_config_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Use Only FIPS 140-2 Validated Ciphers
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-sshd_use_approved_ciphers_ordered_stig_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Make sure that the dconf databases are up-to-date with regards to respective keyfiles
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-dconf_db_up_to_date_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Install strongswan Package
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
/usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-sle15-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -58,90 +63,85 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -149,9 +149,9 @@
-
+
-
+
@@ -4755,11 +4755,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -4768,6 +4763,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -8704,11 +8704,6 @@
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
-[[packages]]
-name = "sudo"
-version = "*"
-
include install_sudo
class install_sudo {
@@ -8717,6 +8712,11 @@
}
RPMS.2017/scap-security-guide-debian-0.1.62-0.0.noarch.rpm RPMS/scap-security-guide-debian-0.1.62-0.0.noarch.rpm differ: byte 225, line 1
Comparing scap-security-guide-debian-0.1.62-0.0.noarch.rpm to scap-security-guide-debian-0.1.62-0.0.noarch.rpm
comparing the rpm tags of scap-security-guide-debian
--- old-rpm-tags
+++ new-rpm-tags
@@ -166,4 +166,4 @@
-/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html b775c963e90cb6872dd58443d8876381816154ded801e45ee476fb35030ebfbc 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html d20b3d1b95f3d5c32aa125b0e6fbe40e5ba80598bc0bc9d89720d59bff515ea9 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html 94cd018e92cbbe06a7f8570b996402a80e1dca6b9a1ed76b3047fc75e7ac06ba 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html 482008cfb9f6b9ab109b95c6d3eb9c5c16e9859821debf26a4db4a18f1c05586 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html a1f3cc5189e3573c63ea75467dda8c04a1c05b771a852ac872bfa203485de436 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_high.html ad8e34d26ec3922a1b7548e749f6bf06354a2c630491192d67784b2560361cdf 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_minimal.html f2a1d208d897630b6e752432524e6140b358cd625245479f28fcde782af3bac9 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_restrictive.html 6cb47a229cf6366ac125b92034a8411453445ae2bfab2fa464bfd41af0adc879 2
@@ -171,5 +171,5 @@
-/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html b40201faa605f8e7e7efc0c42300712c9bd7305d99f956eb9faef18ccbded7fc 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html a61ad079547fcedd3d1ffc295963a32eaf0d882d263b5a3cb65a98ecdcfcb16b 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html ba38c1d23a57fd4e88ee8ae7f0148f7c3219e30683b70232f40ce8827314810b 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html 08b5aba92833c92d31db5a4036486dc2e595c654755c5c1a1649374640cb26ae 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html 795642a60220eeef26e91c127417b944af301ad5c9f5c33eebad3022f1b3382a 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-standard.html d24ca16d949361de74c8be4f6dc9774d0231ac0fedd3992169f9635769e11e81 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_average.html d38bca09108c7c3eeba289726539148e6965cb729004db03536f02f7c46e9d5d 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_high.html bcc89f3a66ab19655fce342eea1c9c36966849cb346a1fde01b0074492cba547 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_minimal.html 8d3f4272a3e1216474ce4b93295830d95eb24333c64917fd2575da152a41ab70 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-anssi_np_nt28_restrictive.html f9ec9c6175ce6671583f1b72c11bc6609ba4a74fa0834299d7685c5e30816b18 2
@@ -177,5 +177,5 @@
-/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html 5e3c7dd6333e42e25d18bbf86ac106ff2539262b504994dda64161f1f1764887 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_average.html 15ca7e5983427da5238d9b028ba53089fa41332773069571bc427af4fb283f07 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_high.html d29ef7bb444f265eef738471e2562bbafc39d22c399251f2da91b1669196d0e9 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_minimal.html 6e03993bc7a9848c3a15f088221c6a22ff48f73cf14453645042ff544cc7a167 2
-/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_restrictive.html e800d30d839b81dec2cb524a58d006eae3d4d6ead25c9375efe8c1101ed1524a 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian11-guide-standard.html 462a7acb9f2eee25a2940476c673b4d645798ccbe897ef0f817ab6f4c0fcec7e 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_average.html 6cf7108528f8f38af18f07862bd164000ea33f52d6f005746cb88d83f3a7ccf4 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_high.html cbe495c8cc6d3d187af20ac23c48902d64672e0cad667f81db9493ca07b9b12a 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_minimal.html f39014d27a21be742ad856872c50f29894764fedbee02d5799c317e08312598a 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-anssi_np_nt28_restrictive.html 379da47a1d74a91afccf6ba71ae497c2a0c66fda7e063bca47634042be8a41f3 2
@@ -183 +183 @@
-/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-standard.html d373b2da310b4d774f9337ba1aafd6efa372a22a1325ea889577aa78635a4a86 2
+/usr/share/doc/scap-security-guide/guides/ssg-debian9-guide-standard.html 0a1f27f37cfb02a4f0286add9c3b0f94ba4294dedd176146d288606d3ad1aebc 2
@@ -226,3 +226,3 @@
-/usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml cf7d5d851c13a9a8eac15decb34208e92c03bac0676f46f0d0ff4d04f61fbfcb 0
-/usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml a86697560c680c32222460c66e4fb828b7d31048878bff60a36e937daeea0cff 0
-/usr/share/xml/scap/ssg/content/ssg-debian10-ocil.xml d21c264512eb857c7aeb652948829e4a1ddd26b9df7aac88cfe9098681a857b2 0
+/usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 4bfe147044c66c8acfdc4df952841685622adcb3a755739676c6d9e5aa6163b6 0
+/usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml dcdb78ec59fc591f6ab6516dc6fcd78b239f697aae6822781054ba9efcbd3b46 0
+/usr/share/xml/scap/ssg/content/ssg-debian10-ocil.xml 6f767bbe2ae685182279bcc6868a30e897a9f9b6f4346bc4b44354e93ce88d73 0
@@ -230 +230 @@
-/usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml 0a87a329d3617784cb9072c83dc4ee201cc37a00126fb5bd9ba0c8c7fd529f75 0
+/usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml e8418409635243928b3d99df6d309753bfa5a0c96cf1370b16ae6b1120fe85e2 0
@@ -233,3 +233,3 @@
-/usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml b9a584cee9dac571f200238db75837489b5d339afaa8c67c99a423bbb55cb0e1 0
-/usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml c4de384910972a31eb778859965f71deecb2c56d943388d53d8c02e082b9157c 0
-/usr/share/xml/scap/ssg/content/ssg-debian11-ocil.xml a35b60d8ff2026ef51aaf1280e050a6bba4eb0c0fbc0119734a651281dbb7a61 0
+/usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml f9103a647dfebed665900ba99cd1b2dbecb40c10a86f7f4f1d8d70df03491c20 0
+/usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 5376243baa0a9bb5faf284b78ea9f73a546426aada6dc084e542a12e6adda773 0
+/usr/share/xml/scap/ssg/content/ssg-debian11-ocil.xml 7230ef5845431a6843c8963437700e3147ba5ea1fcc56c7bd97da822f169ac8e 0
@@ -237 +237 @@
-/usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 86eda0d1d6035c2dc8c29541e2ac6cf711c60c9c685524f89af632af30e9dd98 0
+/usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 4df00d0795f7b6aa25a3f6f656fa44f196bf2598b6f4aa021236d614c4c1e515 0
@@ -240,3 +240,3 @@
-/usr/share/xml/scap/ssg/content/ssg-debian9-ds-1.2.xml 0c9b0f69e0716608c4470fd24239ac3129f59d064b8a6a68b98a1a402d656f29 0
-/usr/share/xml/scap/ssg/content/ssg-debian9-ds.xml ff0e9d3579493236b06e0e737052919593b70ae6f7dc412df8a621109db98920 0
-/usr/share/xml/scap/ssg/content/ssg-debian9-ocil.xml 5fdc1df72f1358ffeae7973ae708a1b4387e65dc17f0ecb25df786decf41c612 0
+/usr/share/xml/scap/ssg/content/ssg-debian9-ds-1.2.xml 16ff314c8695fc4dd3508a0e51d4ef2fa2d1468a2d4de493bfff27e033e5aa51 0
+/usr/share/xml/scap/ssg/content/ssg-debian9-ds.xml 88c371c98bb42dc8fea9ea489d00d9630cd9ccfa6d2534d0e940b76a461604bb 0
+/usr/share/xml/scap/ssg/content/ssg-debian9-ocil.xml 386a832038309e43eb3dfd277708511bbc321314398a6d36aaf66fd8eb445853 0
@@ -244 +244 @@
-/usr/share/xml/scap/ssg/content/ssg-debian9-xccdf.xml 2ff69276fab3efd8755c0c4b4264cecb0ae121c7f5f58c50032ad7596068dfb5 0
+/usr/share/xml/scap/ssg/content/ssg-debian9-xccdf.xml 22e14b97f8b74304b71f432412be5598e2e3f049f0bdf1dd5b3282ba8856c6cf 0
comparing rpmtags
comparing RELEASE
comparing PROVIDES
comparing scripts
comparing filelist
comparing file checksum
creating rename script
RPM file checksum differs.
Extracting packages
/usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-debian10-guide-anssi_np_nt28_average.html 2022-07-15 00:00:00.000000000 +0000
@@ -483,17 +483,17 @@
$ apt-get install syslog-ng-core
|
Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed |
Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 |
|
|
Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled |
Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 |
|
|
Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog |
Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed |
Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 |
|
|
Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled |
Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 |
|
|
Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rationale: | Due to its usage for maintenance and security-supporting tasks,
enabling the cron daemon is essential. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_cron_enabled | Identifiers and References | References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 164.308(a)(4)(i), 164.308(b)(1), 164.308(b)(3), 164.310(b), 164.312(e)(1), 164.312(e)(2)(ii), 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rationale: | Due to its usage for maintenance and security-supporting tasks,
enabling the cron daemon is essential. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_cron_enabled | Identifiers and References | References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 164.308(a)(4)(i), 164.308(b)(1), 164.308(b)(3), 164.310(b), 164.312(e)(1), 164.312(e)(2)(ii), 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rationale: | The syslog-ng-core package provides the syslog-ng daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_syslogng_installed | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1 | | | Rationale: | The syslog-ng service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_syslogng_enabled | Identifiers and References | References:
- BP28(R46), BP28(R5), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | | Rule
Ensure the audit Subsystem is Installed
[ref] | The audit package should be installed. | Rationale: | The auditd service is an access monitoring and accounting daemon, watching system calls to audit any access, in comparison with potential local access control policy such as SELinux policy. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_audit_installed | Identifiers and References | References:
- BP28(R50), CCI-000172, CCI-001814, CCI-001875, CCI-001877, CCI-001878, CCI-001879, CCI-001880, CCI-001881, CCI-001882, CCI-001889, CCI-001914, CCI-000169, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-7(a), AU-7(1), AU-7(2), AU-14, AU-12(2), AU-2(a), CM-6(a), FAU_GEN.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 | | | Rsyslog is installed by default. The rsyslog package can be installed with the following command: $ apt-get install rsyslog | Rationale: | The rsyslog package provides the rsyslog daemon, which provides
system logging services. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_rsyslog_installed | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-001311, CCI-001312, CCI-000366, 164.312(a)(2)(ii), 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, FTP_ITC_EXT.1.1, SRG-OS-000479-GPOS-00224, SRG-OS-000051-GPOS-00024, SRG-OS-000480-GPOS-00227 | | | Rationale: | The rsyslog service must be running in order to provide
logging services, which are essential to system administration. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_rsyslog_enabled | Identifiers and References | References:
- BP28(R5), NT28(R46), 1, 12, 13, 14, 15, 16, 2, 3, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO13.01, BAI03.05, BAI04.04, DSS01.03, DSS03.05, DSS05.02, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, CCI-001311, CCI-001312, CCI-001557, CCI-001851, CCI-000366, 164.312(a)(2)(ii), 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, SR 6.1, SR 6.2, SR 7.1, SR 7.2, A.12.1.3, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.14.2.7, A.15.2.1, A.15.2.2, A.17.2.1, CM-6(a), AU-4(1), DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.DS-4, PR.PT-1, SRG-OS-000480-GPOS-00227 | | | Rule
Install the cron service
[ref] | The Cron service should be installed. | Rationale: | The cron service allow periodic job execution, needed for almost all administrative tasks and services (software update, log rotating, etc.). Access to cron service should be restricted to administrative accounts only. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_package_cron_installed | Identifiers and References | References:
- BP28(R50), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rationale: | Due to its usage for maintenance and security-supporting tasks,
enabling the cron daemon is essential. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_cron_enabled | Identifiers and References | References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 164.308(a)(4)(i), 164.308(b)(1), 164.308(b)(3), 164.310(b), 164.312(e)(1), 164.312(e)(2)(ii), 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-6(a), PR.IP-1, PR.PT-3 | | | Rule
Install the ntp service
[ref] | The ntpd service should be installed. | Rationale: | Time synchronization (using NTP) is required by almost all network and administrative tasks (syslog, cryptographic based services (authentication, etc.), etc.). Ntpd is regulary maintained and updated, supporting security features such as RFC 5906. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_package_ntp_installed | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.4 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_service_ntp_enabled | Identifiers and References | References:
- NT012(R03), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000160, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), AU-8(1)(a), PR.PT-1, Req-10.4 | | Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_ntp
class enable_ntp {
service {'ntp':
@@ -1806,6 +1803,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["ntp"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service ntp
block:
/usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian10-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,19 +143,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -168,14 +158,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -183,29 +178,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -213,9 +213,9 @@
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -2026,11 +2026,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2039,6 +2034,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3838,11 +3838,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3851,6 +3846,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3882,11 +3882,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3895,6 +3890,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6694,11 +6694,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian10-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,19 +143,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -168,14 +158,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -183,29 +178,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -213,9 +213,9 @@
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -2026,11 +2026,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2039,6 +2034,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3838,11 +3838,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3851,6 +3846,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3882,11 +3882,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3895,6 +3890,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6694,11 +6694,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian10-ocil.xml differs (XML 1.0 document, ASCII text)
--- old//usr/share/xml/scap/ssg/content/ssg-debian10-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian10-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,268 +7,256 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Disable Accepting Packets Routed Between Local Interfaces
-
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
-
-
- Configure auditd Disk Error Action on Disk Error
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Verify User Who Owns group File
+
+ Require modules to be validly signed
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Harden SSH client Crypto Policy
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Verify Only Root Has UID 0
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Allow Only SSH Protocol 2
+
+ Enable Use of Strict Mode Checking
- ocil:ssg-sshd_allow_only_protocol2_action:testaction:1
+ ocil:ssg-sshd_enable_strictmodes_action:testaction:1
-
- Record Unsuccessful Access Attempts to Files - creat
+
+ Configure auditd max_log_file_action Upon Reaching Maximum Log Size
- ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1
+ ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1
-
- Ensure syslog-ng is Installed
+
+ Enable the NTP Daemon
- ocil:ssg-package_syslogng_installed_action:testaction:1
+ ocil:ssg-service_ntpd_enabled_action:testaction:1
-
- Specify the hash to use when signing modules
+
+ Prefer to use a 64-bit Operating System when supported
- ocil:ssg-kernel_config_module_sig_hash_action:testaction:1
+ ocil:ssg-prefer_64bit_os_action:testaction:1
-
- Enable Randomized Layout of Virtual Address Space
+
+ Verify that System Executables Have Root Ownership
- ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1
+ ocil:ssg-file_ownership_binary_dirs_action:testaction:1
-
- Verify User Who Owns passwd File
+
+ Ensure SSH LoginGraceTime is configured
- ocil:ssg-file_owner_etc_passwd_action:testaction:1
+ ocil:ssg-sshd_set_login_grace_time_action:testaction:1
-
- Record Attempts to Alter Logon and Logout Events - lastlog
+
+ Disable Accepting Packets Routed Between Local Interfaces
- ocil:ssg-audit_rules_login_events_lastlog_action:testaction:1
+ ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
- Set SSH Client Alive Count Max
+
+ Verify User Who Owns Backup passwd File
- ocil:ssg-sshd_set_keepalive_action:testaction:1
+ ocil:ssg-file_owner_backup_etc_passwd_action:testaction:1
-
- Ensure rsyslog is Installed
+
+ Add nosuid Option to /dev/shm
- ocil:ssg-package_rsyslog_installed_action:testaction:1
+ ocil:ssg-mount_option_dev_shm_nosuid_action:testaction:1
-
- Add nodev Option to /dev/shm
/usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian10-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,19 +43,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -68,14 +58,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -83,29 +78,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -113,9 +113,9 @@
-
+
-
+
@@ -123,9 +123,9 @@
-
+
-
+
@@ -1926,11 +1926,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -1939,6 +1934,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3738,11 +3738,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3751,6 +3746,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3782,11 +3782,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3795,6 +3790,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6594,11 +6594,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian11-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,19 +143,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -168,14 +158,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -183,29 +178,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -213,9 +213,9 @@
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -2026,11 +2026,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2039,6 +2034,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3838,11 +3838,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3851,6 +3846,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3882,11 +3882,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3895,6 +3890,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6694,11 +6694,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian11-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,19 +143,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -168,14 +158,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -183,29 +178,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -213,9 +213,9 @@
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -2026,11 +2026,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2039,6 +2034,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3838,11 +3838,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3851,6 +3846,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3882,11 +3882,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3895,6 +3890,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6694,11 +6694,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian11-ocil.xml differs (XML 1.0 document, ASCII text)
--- old//usr/share/xml/scap/ssg/content/ssg-debian11-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian11-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,268 +7,256 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Disable Accepting Packets Routed Between Local Interfaces
-
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
-
-
- Configure auditd Disk Error Action on Disk Error
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Verify User Who Owns group File
+
+ Require modules to be validly signed
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Harden SSH client Crypto Policy
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Verify Only Root Has UID 0
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Allow Only SSH Protocol 2
+
+ Enable Use of Strict Mode Checking
- ocil:ssg-sshd_allow_only_protocol2_action:testaction:1
+ ocil:ssg-sshd_enable_strictmodes_action:testaction:1
-
- Record Unsuccessful Access Attempts to Files - creat
+
+ Configure auditd max_log_file_action Upon Reaching Maximum Log Size
- ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1
+ ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1
-
- Ensure syslog-ng is Installed
+
+ Enable the NTP Daemon
- ocil:ssg-package_syslogng_installed_action:testaction:1
+ ocil:ssg-service_ntpd_enabled_action:testaction:1
-
- Specify the hash to use when signing modules
+
+ Prefer to use a 64-bit Operating System when supported
- ocil:ssg-kernel_config_module_sig_hash_action:testaction:1
+ ocil:ssg-prefer_64bit_os_action:testaction:1
-
- Enable Randomized Layout of Virtual Address Space
+
+ Verify that System Executables Have Root Ownership
- ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1
+ ocil:ssg-file_ownership_binary_dirs_action:testaction:1
-
- Verify User Who Owns passwd File
+
+ Ensure SSH LoginGraceTime is configured
- ocil:ssg-file_owner_etc_passwd_action:testaction:1
+ ocil:ssg-sshd_set_login_grace_time_action:testaction:1
-
- Record Attempts to Alter Logon and Logout Events - lastlog
+
+ Disable Accepting Packets Routed Between Local Interfaces
- ocil:ssg-audit_rules_login_events_lastlog_action:testaction:1
+ ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
- Set SSH Client Alive Count Max
+
+ Verify User Who Owns Backup passwd File
- ocil:ssg-sshd_set_keepalive_action:testaction:1
+ ocil:ssg-file_owner_backup_etc_passwd_action:testaction:1
-
- Ensure rsyslog is Installed
+
+ Add nosuid Option to /dev/shm
- ocil:ssg-package_rsyslog_installed_action:testaction:1
+ ocil:ssg-mount_option_dev_shm_nosuid_action:testaction:1
-
- Add nodev Option to /dev/shm
/usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian11-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,19 +43,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -68,14 +58,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -83,29 +78,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -113,9 +113,9 @@
-
+
-
+
@@ -123,9 +123,9 @@
-
+
-
+
@@ -1926,11 +1926,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -1939,6 +1934,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3738,11 +3738,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3751,6 +3746,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3782,11 +3782,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3795,6 +3790,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6594,11 +6594,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian9-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian9-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian9-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,19 +143,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -168,14 +158,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -183,29 +178,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -213,9 +213,9 @@
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -2026,11 +2026,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2039,6 +2034,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3838,11 +3838,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3851,6 +3846,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3882,11 +3882,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3895,6 +3890,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6694,11 +6694,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian9-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian9-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian9-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,19 +143,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -168,14 +158,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -183,29 +178,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -213,9 +213,9 @@
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -2026,11 +2026,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2039,6 +2034,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3838,11 +3838,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3851,6 +3846,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3882,11 +3882,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3895,6 +3890,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6694,11 +6694,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
/usr/share/xml/scap/ssg/content/ssg-debian9-ocil.xml differs (XML 1.0 document, ASCII text)
--- old//usr/share/xml/scap/ssg/content/ssg-debian9-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian9-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,268 +7,256 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Disable Accepting Packets Routed Between Local Interfaces
-
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
-
-
- Configure auditd Disk Error Action on Disk Error
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Verify User Who Owns group File
+
+ Require modules to be validly signed
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Harden SSH client Crypto Policy
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Verify Only Root Has UID 0
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Allow Only SSH Protocol 2
+
+ Enable Use of Strict Mode Checking
- ocil:ssg-sshd_allow_only_protocol2_action:testaction:1
+ ocil:ssg-sshd_enable_strictmodes_action:testaction:1
-
- Record Unsuccessful Access Attempts to Files - creat
+
+ Configure auditd max_log_file_action Upon Reaching Maximum Log Size
- ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1
+ ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1
-
- Ensure syslog-ng is Installed
+
+ Enable the NTP Daemon
- ocil:ssg-package_syslogng_installed_action:testaction:1
+ ocil:ssg-service_ntpd_enabled_action:testaction:1
-
- Specify the hash to use when signing modules
+
+ Prefer to use a 64-bit Operating System when supported
- ocil:ssg-kernel_config_module_sig_hash_action:testaction:1
+ ocil:ssg-prefer_64bit_os_action:testaction:1
-
- Enable Randomized Layout of Virtual Address Space
+
+ Verify that System Executables Have Root Ownership
- ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1
+ ocil:ssg-file_ownership_binary_dirs_action:testaction:1
-
- Verify User Who Owns passwd File
+
+ Ensure SSH LoginGraceTime is configured
- ocil:ssg-file_owner_etc_passwd_action:testaction:1
+ ocil:ssg-sshd_set_login_grace_time_action:testaction:1
-
- Record Attempts to Alter Logon and Logout Events - lastlog
+
+ Disable Accepting Packets Routed Between Local Interfaces
- ocil:ssg-audit_rules_login_events_lastlog_action:testaction:1
+ ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
- Set SSH Client Alive Count Max
+
+ Verify User Who Owns Backup passwd File
- ocil:ssg-sshd_set_keepalive_action:testaction:1
+ ocil:ssg-file_owner_backup_etc_passwd_action:testaction:1
-
- Ensure rsyslog is Installed
+
+ Add nosuid Option to /dev/shm
- ocil:ssg-package_rsyslog_installed_action:testaction:1
+ ocil:ssg-mount_option_dev_shm_nosuid_action:testaction:1
-
- Add nodev Option to /dev/shm
/usr/share/xml/scap/ssg/content/ssg-debian9-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-debian9-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-debian9-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,19 +43,9 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -68,14 +58,19 @@
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -83,29 +78,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -113,9 +113,9 @@
-
+
-
+
@@ -123,9 +123,9 @@
-
+
-
+
@@ -1926,11 +1926,6 @@
SRG-OS-000445-GPOS-00199
The AIDE package must be installed if it is to be available for integrity checking.
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -1939,6 +1934,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -3738,11 +3738,6 @@
other required structures.
This package contains command line TLS client and server and certificate
manipulation tools.
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3751,6 +3746,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3782,11 +3782,6 @@
server applications. Install the nss-tools package
to install command-line tools to manipulate the NSS certificate
and key database.
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3795,6 +3790,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -6594,11 +6594,6 @@
SRG-OS-000342-GPOS-00133
Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common process in information systems with limited audit storage capacity.
-
-[[packages]]
-name = "audit-audispd-plugins"
-version = "*"
-
include install_audit-audispd-plugins
RPMS.2017/scap-security-guide-redhat-0.1.62-0.0.noarch.rpm RPMS/scap-security-guide-redhat-0.1.62-0.0.noarch.rpm differ: byte 225, line 1
Comparing scap-security-guide-redhat-0.1.62-0.0.noarch.rpm to scap-security-guide-redhat-0.1.62-0.0.noarch.rpm
comparing the rpm tags of scap-security-guide-redhat
--- old-rpm-tags
+++ new-rpm-tags
@@ -648,2 +648,2 @@
-/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 5a5234051bd3cef952cbe8ae1bbb5ccea55ceeff641a1e6e1910e0a9236ca5de 2
-/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html 4950c8240a705c420f7b2a6fc9be788fae42c3d9b56267fc6b42ab50949f2791 2
+/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 8a974a1af22cd8edfcd19f2948d8b1f06371acf45d7d6130b23865ff705bbc69 2
+/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-standard.html 6ef15939165f7ce576e431029fa6f6a97fd478ffa6d6ced09ed7b42031d22504 2
@@ -651,13 +651,13 @@
-/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html 33ed172899a417f119c5af250eba4fb7b955aa0db8cc4da5ca7b45d1d5480645 2
-/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-standard.html d0c45181535ebd1de91d9b2771fadb8079bb1b29467628e2d277721f984686d2 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html 67b3950ff424e691cf48a703f92adb5c238f3527cd2586179b0d08f70d30e993 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html af0c901eff8bbafc30a3f496867d600252a6c55ff0bbec90cc69fa10d8596a07 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 91197af363c07377b64b208554aae2a86c5eae69ab9c5f8cd46bda786be0be3d 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html f8a9d3771c5c273e71c37cc93366576ca740c3d1548416cf415c9df69b8b1a3e 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html cabaed5b17da758aadc76d792aae0e7b1eb90ae888468880b1163c6152d38945 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html 41ebb713c0727e651a4bd3d4ee47dd8c59745b828a28991ac9f650407a711c26 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html 96b4c6264a4c64b89b55f46133a016ac2fee493f3bbee3298829890bc8fd08b9 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html 75c23e98705a40f340b9bc1216b85d8d74f0d8dae88b188f7ca66f7ce7299cff 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 758129cc573f9cb6660d6f19c931bdf49d5782af238f70b747a44e14c3913254 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html 6852a9c5d292971a8bd9e0d2a84172c2371931b0b49e7b28afb8662fa6e59cfe 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html ebb0782b5a9e022f71e645da6b8d8ba19c8882f348aab1974da2c62c85ce4a38 2
+/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-pci-dss.html 985abe49c6ded298c7c87736be443110df20a9661b978559be4318507acb4163 2
+/usr/share/doc/scap-security-guide/guides/ssg-centos8-guide-standard.html 162e7b61b601930ee58f2d89bc6eed58a6c8c865c9a29221075393435e459ed3 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_enhanced.html ebd53d2af9df7a5cd2f75297e70a605e9e470a7d1f86c5dc467789e7e3bab154 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html feeba4d2d1aaebf6e29f490872975c444047f28c184dcd8f68bb91c87cec0007 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html e613f36b44bcea51fc1756962ce000a4b1d57bcda8ac914fdc08cf0db502c285 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html 4c147e53965105a34d508dc1488206b59d1a37b446ce159eaf989e2b9a924cca 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html b6a6be60dd70b2b4943ef35a60bfef12fbd0259189016b920476d4a66f78bc4f 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html bca7a8802a29f98df55f6d201780625295878d3c0d9b7cf3dee3081207b46770 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html 2e29d50e88c370a04422a30aad2b4a807b88ba0824611038cc022e4e89dce778 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l2.html 41df9c84af07eff20779f83d7249388581456733377c6f7259164476ca907ca0 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 582dd1c8f6e08205efe46c0cd00b408272aa1c7026f2e45d37a5a3e655644441 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html b9d10b55aa3fc49e04ea04fab5460c047d9132fc17585366ef08931ab2281e98 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-hipaa.html a045b2fce0609d7e7ff4bbc8ad6c9cf551f14b2e3a2bbe4dddd2859a5b17c537 2
@@ -665,5 +665,5 @@
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html 58da38c0cb6cd833c2f95d1a865e6024c8fab8e9fdb7c3fd6b43327c8799578f 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 62773ac61db03187452653d22c33d134e17989fe54fb0f23bb1382ace2782569 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 1b007f34b004c647a65600668c922c6ef94ddd983aaaeb443b77acd649d99ca6 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html 19a719aa5cb9b2cb98778f404a09389ee964caa23930f32a7cbc596c973f5fc5 2
-/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html 94495db2ea1366ab1c1e10ecd914175978861646d7046164b660f82e2e9fe8e1 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ism_o.html ea1e603c7d0e53112440db69fa2a8edc193e1a8ee92b4a307c68d0d2c92073c1 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html f98b660e573e47435c27a1bf016a13cf0a2ed0a27c8bc3f55a57e34c2714870a 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 7a702cdb5ca9c51bd346ddc7dacd25ee3607ed9f30b1857199c01f4977f10727 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig.html 6a5484d4128534c0448fcce1e9f2bffc4c0ed84268c8157694ae37bb0ca7ed63 2
+/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-stig_gui.html a07f3df06bb4af72d5cd9c79c40bf999054bde49bcdb2ad0d318f8f52665f448 2
@@ -671,11 +671,11 @@
-/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html c08c93b4cd904904df0c02c78b2af11cccb7c87eb7e6c06964cbf1467506cf3e 2
-/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html 8348b0bbb30d93693b2b1e486a506dc425a7d91fa0a37b62671e265480aec6dc 2
-/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 107c1ec8bf09a61bd4f972f408d6d17305720e1844bde07e41a5149598227f34 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html e601236740507d073ad36e9a432a26805ef1dc7d90e30a6c16ee11ae23929479 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html e0253e8e7af54501788863e00d49e08d784917f6fd93d9c08e1058fc2acd9575 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html 7979565b7873de6edf6ba80908f7982a79bcd923e5265e267f2ecbf708e535be 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html c3faf922a5ad0c64228d68f51b2245ebb530fe5340add48aa892b27074bff298 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html d479ef3872f97a3128b3edb9257201ab97afe4cfee77454fb6b2cb32fda213d6 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html c0065a50fab648bda58b740704fdc925ce545b5fc021228be9072a7c617af989 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html 021024e95f0b784efcbc6e9f5b5e8c33216d1d0db47805cae6eeaa2571caf2f4 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html daf9a1e3a3d333bae987de4cca06b14e213bdcef7d23582139901cba8b4e2efc 2
+/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-ospp.html 58d73c72ced30bf87a80c5608277af1d4cf198af6d6eb260782dc6531ed032c6 2
+/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-pci-dss.html 50646c65e08145c66867c1fb450bee215b3c80734ca8f335cb48173d7236ff7a 2
+/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 2f28d458aaa3c2afd584ae65b83990f47a52902a27a57028a593ac39418f58cd 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 25d8f64be75dd52cf998e998be5865d6cbfa01b3d8a910655d22ec0889683c83 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html c09a91a2cb8455cb4104a68ba9e32f25194e43ee5e464f757a23167c9afa6b15 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html 07992fb99d612bb5cdc8093849bfbcc80368f3a55c18ccabcdce26bc76633e4c 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html 3bca3058865e1227f08a8bcf879b26703d643d506272788ed697fc57da3c829d 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 4a49ad66abd49ab8ebbf25955c87ad9190e7e6a6f939d91b9307ca472fb2a141 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html 83adbb4b1db81b37f7dc476673a58f4daf0836cbe4ddacf00063039429f8d70b 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html 11e45e1c9a8fb06185da7086b5edff9094f56d807bab1357467f91735d5ba699 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 95731f28f8843f665e0ce71cc58f7d9b7cf135ee24a16f7b90d588be6b8893f4 2
@@ -683,14 +683,14 @@
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 8d059aa27bfea11cd22ab09acdc50518870c180f479335c305d159998346832a 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 00f21b58c0a4a56a3d347c6fbdda13a77bb350f2339eb460b692038a012740b8 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 90861a9055c7d0fccd2b3084177e040dcbac08a815e23e91ae864fd7632da3ab 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 81cc29243d8a323b1545db7e1528b856ce39d7dfc3001906d9d56ebdbf630dee 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 6839b5eb6f988eddd603873ffcd1e3e36bfe0f24c8d64276c99fdf2275f716b8 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 54cf0ec4eec64d8f55a5b67da75595ca346b4f00a10dba3bdca4374006e997df 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html a1fa88f01e5dbb10f179097ce074c00f30aa20bca92dbb8be6d6f97d562bc22e 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html b006783373e1de80266e71ea47949fba023aee10e907b2e9932fea06ff37ab9a 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html be0dfcd767e1f3bc47f2202562e4921019a6e17fae5b1d25c17f6010fa618056 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 0ea5a37fc7d9dd8b1923fb25d915ca682ee1f099b3f682fcb08eb95620c18929 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html b0e01aaaf0d4e8af158146800b499188217d241be441e457e20972bbb5021789 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html e11c6fed8f31fecc7c31a038b933bd2ac20be2db2982c8a55e07c829044f0b49 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 84286961050db1b64fb9b964a9eea9222fcdb645e7a70e0736458f56f7d9b5e0 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 1fd4367e28dfcb4551e8db6b94842ecf0cb8cf5912f3b9e24c089d73bdc38602 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html d949201b67027918fc0b00ff9b79c0f4fcda3b1f9194f987571fa0fe14dd90d1 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 5667e5ca3178980441f1db74ab8b71c7e7ffda367c3e855067b586da586a7cc2 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 0045e978e28bfc85835554a6660fbe97ee9cc4c1ba75c8516080fd443553249f 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html e638df93389d86291781be4767a672573af6604c6ee9816a38d5b985b14909d2 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 459deed73b9b3ec86b0f2dbb8ef3d5d6d72b6778be7e092f12f047dc81bcee41 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 057988b231f8561867f50eb0162441f775049e35edfda9036a580ec1d9b9c14e 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html c414f51b635d2b3926e67ab2257a57ded203afad68b4ea490c1eed730d28bcec 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html 3efb87e21b6b43e5a4eae4a35722370facaff197aba70820dc892b1511d1d203 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 523aa4930b63d21ba8d9035f449b46200dce06b38c4aba9f44c8a2eeace53359 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html c6c3b45fb0e921bf95c5f41daeb7903d0d270c08987fd1b6e35fe88203b380ce 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html 294e865b65a084f993d9a5bd6a8bc5d82db66afbdb368f614e68a1dd9ceb47bc 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html bf04c8c973fbf54528202dbfe1f1fa60aca0d947080cac3d5898769503fd5671 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 6e1d8fefb3caf86509752772e0187d55f57f36c134f11e242e9075f37ccc5afe 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 7b46c9eea0b7c2b9c9435d5fc049eb0831740995a351e5336acb48acbf879301 2
@@ -698,5 +698,5 @@
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html bb3ba6f28d3cff7c7388d5c9ff518d3adf480a7d0c95a99d9fab7d6157cff77c 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html f7401bdc85bdb7ba8ffab62e4dfb85c9500ade9bdecbb7d625b7e7f1c9354788 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html e2babb2cc13e68493da4497d90267392d7d5bd10c800de13c7695dca0b5bd306 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html c19c685bc5622f2891023ec098ffa446e28215ffb7935b603b607ec1d00ea186 2
-/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 33d5772662e6d9dd196b116b33375f52550d91351087c24a0c8ec4c1be9ad9ed 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html 95fbd882b28fead680e5b4dc097be6d6d735a81478fe7a9ef21a9936fd217448 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 25018b5cb312050eb6eed5e0210887f125177aea799f166d9895003fd7254914 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-standard.html 6d5637f38832f32f692ad5c7dab16b7151459da5582e436657e43403fcb1e08d 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html 87d0c90aa09cc0e6ad844927070f8c923e6268ac872001de0df99887e4678be1 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 898b4712bfd45891e2ee353b86969f304f0ff965c894795054afe1bad2937846 2
@@ -704 +704 @@
-/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html 0f147bb505ba960c4f7a0deb7e8cb0433e98e03a44726965c7aca598d8e693f0 2
+/usr/share/doc/scap-security-guide/guides/ssg-ol9-guide-standard.html 4bc9bc3bd74a73a3e5501ec1352dd63e85da1c295a9f4a62ce9ddab687d1709d 2
@@ -710 +710 @@
-/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 0153e4964738601e26fd9e51ae4dfe47f1b449ab44665a717df3c4d57f174e15 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 9def44f9b3f05c811f17ffe4c2be1f8d72eb34b820adfa2025e342f03ef402ab 2
@@ -712,16 +712,16 @@
-/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html 8049e05e69bf23751064bb0fcd8631fad9f165642fc78c9eef9dbbe3365299c8 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html 08ec87ea9cf4361cb4f235d83f81cbee3bf34839e8f1a3cd7bcda20c83e7635c 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-ospp.html 204227b3bd7bbb5f2f037c12a7bea13e57f2049b47fc1dc77b330286e853e8af 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html 6ef2a8f54fe8a384b2085e53c4fa94f59def150ac0e531cb30776a65280dce42 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html c359ec270715138f76f851a8d4ac4876266b37eab084582646ee261b8ce3e6d0 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html 7fffb2be691ade6041727726bd921eac50f58e4231f278ad6630da70865fe50a 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html 42b15b51442d4cc07e0f321d62ba60d6936f077f085e253f55a8810d7e5e6e5f 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html c4fdb1442c6fd208fc015e3f875f569586abea2d9b59df1c2cc9716124e6258a 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html 4110486538d63c232db1151b48a5c3348a391f45c1f6ed0c7b36043a7ea006fc 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html 230dda61d70201aeccad0fe1b724b9be253ba4f6a70753baeb3562275a11863d 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 8c359b49300d978366b40870e0ff2fc4e7c2cd40d0714d074667ae55dafb7998 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html 47a60b4b1dc52c7a6daa8f540dd91e6915013ec4e769f21626c0f71dfa672481 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html 9188a5763c05d391a8f6ec0a7fcab8c20f735c96e3a652051a7777b97f7f39a4 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html 99945960ced2311419de325aaa87c981ab946f66a9f7feee889ee2d683ed7f4e 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html 05af4161ffd4b9090c56a78a7efef530c575b098e098026013a1b497bba0c20b 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html 9cba49cd916db280f310a76b9c0271112cf2bf6e591fbd39dcd99db1544ad669 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-moderate.html b6ca4d746ed1dbdc374082b66dcfc168f512c715dcb25af17cbe194f3f1152fe 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-nerc-cip.html fcd1febe9bdf769317b6aca41645bc079f0ffa1acb1a6807e6422efefc858e19 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-ospp.html 8521c80a8999971ec837719f842d47282524879dd73b8ad51daa7c985dec7974 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-C2S.html c023f1033e2294ed2bfee7aa997d5fa63d10c158da877e3b4e54f4a0d494b617 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_enhanced.html f30fc8d40819161e9c8bb4c8266924e9fc6a6c295ccbf1d570b4f25c59b65d27 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html 4b03cf162747ed0841758539a3df70b7916c9620c5f3d44b241a952ad09cc893 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html d91885dfaa9f84b58ca0664d94206262b1c574a4123cbf6e813ad20581be3eca 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html 6d9629f4efb1b4ad55da56abff9dc45cfb7bbf59ef50d263272568504b26072a 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html e8d73fda01f0865daf89d464242c254b13f8ba386baf04641ff079fe41e5f7f7 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html 39635cd06b338c12ba4df2761292befd6f1bebd0d60b5c27dd287f9ec3026a77 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 37316b99aa445b5cdee124b3763f81932ef9132936acc2f1cfef5441f6581a15 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html b61c399750d93b07282b58d81cfa8316182047039924e579a20522a73b1b88ac 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cjis.html 7cad88b7b6e8077847733d01b314a7e22ba5ad8143e74543b76b9a1b799af447 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cui.html 24dfa594be498be5c7d2feb7b6f2fa916b3772a5007a684ad71a8a327844b693 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-e8.html 259872267b83ebecdc7b48ad231a2ca5df055a9e58d86e4ca91c84f6101f8756 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-hipaa.html 25d9e051742a2669564869092c56f3732e4d25b58570f3762aa50f9d832eed67 2
@@ -729,21 +729,21 @@
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html d92ec8d84928d3f89078cbf794ec65c1e2cf05a819115bbf24b6bc3b9811bf52 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html 9d8e2ff5f146e4c871b1fe511ed3a9614c933daac7960d3e66afcfe3051e067d 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html a2773683736e5829f103a307137f3a9ab78c24175b6fe1cab46fed9762ebf6f5 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html 77260e0e556f574bc499918dfb37c5d67d889e055d2fcc74c173bc4498d7de33 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html efea0080152d9b523d1a0bfd77a6b784051f2b7d1fac8fcb2976130fff5cd5dd 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html 7d53900f8dd508eb4946a6042e6aa50e62a6c6d5b485844823c1384adffca4c6 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html e0c90f3a74592be56925ef176553de28144d831704227415b5d078769fb063e7 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html 74ec6d6c54611a2d81ff21b1cb47e8d63db9fef8db997af3a97fbd30c62af2c6 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html 26b646b10378c8729d83b9fbd69fce53cde129aae002dddcda1f7dffcdc2a997 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html 150d432aaff030b7bb2d8f078256605c130e83b35e829fdf6dcbec40330d0fb9 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html 8d6b787c5e03602f11abfb9dbf5473a9a19653155e4592b9081558c8c9768a21 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 909750190b556e5d7261930622e6d7a35544dbc390306d4ee7061961018b916f 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 7fe6a26a06150e73e712a0230091cf92f2c487a13adf3063834633ba863ee84a 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 76e35bd727e0dcb3b4e51f9abd67bf3991d12851036c75c6dc10f1aec23e223d 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 9130ac0f180376abc480fccb4a5fc82bf625d1ec33be13d9d0ebf746bc580b0a 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 581af46d4b13d39f4bbd6af3d8f3478bca4b72984021ed70e641187d9702deb0 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html 06326c89eff339dba25804356d6ee51b389e0f54f67e1a028e217b2ae75b4704 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cjis.html 5aed6ed227c834b61e0bbccfe70d2f1a8ac9f50e8a498f9893445c59c5f8d929 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 2b567ace41da55eeee3df59e5cf3f5fdfa1f5e8b57b24b431ca08c210c3c46f9 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html cd6183ff90017b146e5a8de60da1fee1077066cd28bc37998c6988d67b4615b7 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html 6d1702b4f8f8ee1d27e6e01e913beeea2640118edd4d5647a7022c06396502ff 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html 96b852d10b67e33c5046fe21564b38e2f3e6418d0e091b0baab92256bd8161e1 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ospp.html 1ff0791eb539fa76b9160e2b27fb2aa965e324ecf9e46319db2595beb85a43a2 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-pci-dss.html e35a45f245ee6c6cb485300c18dd3968c9248c072224711d9a1b1033fb35a392 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-stig.html 3f9a755fd66c70da6252b92fda027da001e3df5ceef530d7e6e8b59b9715c769 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rhelh-vpp.html a7d07bb972e11178b0d789a47e40c4841f61307fecbea0e6405b096889890bc3 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-rht-ccp.html 40fe18b783c2e7516090bf4cb18426096d0b414cc0f8de8e59d7298807e06875 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-standard.html 86a43de8413ea8184aaba0e5d162f671ccea25fedb429cbde17a356402bec832 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig.html dd684a8d8f949561bb6e65699d64e21ec66a2b6f93461744d34b6b07b4dcc7ca 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-stig_gui.html 416749ef14a9ea7930640322dc685990470f2d42bf0f6597c34b979d08ce09a2 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_enhanced.html f3b03166c21f0fc5c7e1a95b0cb2537e269e5e0b394daac538e29d4cf26481f7 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html f5d8b0bd59d737fe8cf3cfb2cdfd0c7959e783cea84ee1c2ffe9936847e5f062 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html f2483f1070d45e44909182557e6b7025c531ca5a47ee1c72b57d201ce1b8c69b 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 62bd1e82e839aca57cc3ea467f5d26817e51618d94cb62a8bdad2d55c159ecb9 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 1547e779cae39730474f9593ff4ade79a5a668a910171154e97466addc4c768b 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 28b2648c449072eb95814bac96e21068807ba8909692cd554bab966c830f08cf 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 56feed5dd09ab17f2bf21f4e815b0c6f9660c3cdad0977a91bdec0791353221d 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l2.html 46f759091343273d5adf9a53221633548bf6b4ff8bbb47951da8a318021110cc 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cjis.html 8a92048e8b1372f000ef2ba2e5cd3eaa0b4b550618a2484257f6925ff095158e 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 15ce1480b1fb9bba3be0de4d067b4afc66d2cfb2d04ce107f998b08df375de51 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html 5ea18e702638deed0bef5a0b4ef9d006c3e86793f154fd547d01822adaad6aa6 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-hipaa.html e5c18aba3a1efcdb4262adf2395257236604cbe4d3100f6edfce6141fd8f6ebe 2
@@ -751,18 +751,18 @@
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html fdd96f703d499b901e89f7449d6165828630651ad1abf4395ef5cb68865b2a26 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 99ac2cfce6c6de348736d24388ad9514ad6f2036c14b29e8d2dd3b5085460383 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html 26d5ca362f6cfc314f51842eda71e9e10d32cb1409c4eb9d2e54471dc8993009 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-rht-ccp.html b8ffde91182cd9312b231df37fc9e94ffec0c9fa567be6a366cc21c5bea38b57 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-standard.html 733ad60f966f2d61518c706ff1443366fb4103cf4cbcc23b167292ff05f2a81b 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html 0d3706bc5724c6f6a0c13fc5af8a097cecaa2515df0c4d26154c803f42846641 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html 69c133866fe815f70821c53a2d650b9f976ee001c4d27cb29e9e0a22fb46220b 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html 2428cf17bd9fa7191d9b7c058ce901d55968f4cf6a4e1841f6cfd46a35a6b244 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html c39126cd3caee70a81db53d252389241363d4e1a8f0c145c6b6024dbb4dc4823 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html c2b3e1e75b96263aa72bf1e916100c531f9e1680cdbd4d84179f45afd574ed6b 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html f2797f125cf666d680282deefa07c3c40331ce1ed82e70016d684bcac39e7076 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html 55b2e4a3107e711c5829ae7a737c70152c943ef9fc3d8eb63cb911f60be53a7e 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html a38448d0a30de83aad494e9259a7dc39edb698dfcc0a0e2b9319597c7a7d3157 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html 771620c3d4c3c02c2162e281769b9fc9e9ace71bd23c76058c6f58a6572203e2 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html 69b2c549359b9dc5b530d73a697152a5ff717deafe71e05281389127b6f24e46 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html b50a0e0bdd526064ce9139509e40c4829ea958258737fc430cdcd52002f23a2a 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 9f9e30dc46c654eb729ecad0990ed07aa8ff66d25bdebd8b8a6408784c34f4fd 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html 686031de1ae30e5bb519fa904b35a8f9f2ee290d504465d5f1625c0eb5e33f92 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ism_o.html 9d19a5acff222b93d29b5a68c1e0f661542e14ad2a648e50b21a9ac3f78f16a4 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 35061007fd8492e60941b8e37310c36925af515d3159c4007a799618ce8fd1a0 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html c0c569c2b63cb1333e2bdb8e9ead46fdde939286785073c6fc779bcf13cd0567 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-rht-ccp.html 3ab497e547164e52b58ef13a9e99d634a13ba58996d8d508432082f9e51451f3 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-standard.html b74903576698b0ba09fd884d9c608143d3264a81402b5f1fb945ba3e8e3cc31d 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig.html c99549e8c7a8c50b2b4588f16f83e34fb13ec307e21c5335bf50b9f90e5190f8 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-stig_gui.html 0ea943eb30d8799a8e466d8303558d68b1c4591a89465c3cebce2eedddfb81cf 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_enhanced.html a9566a78268d3d48ae53428cf6ac3afa53068864fcdc609530492d0338220fcf 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html c7ed68b6c47d538895cf1215b46fecea1942602da862c0b8d4517454595e88d5 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html 1b512fb8f2377a455524582e6cdaaac9ef032635d87168d5e5e4a54a4824a63b 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 6605fb9382c54b3ecd0a4d03082b12e9666be82aaa1f1ed51acea975e51eebcb 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html cbe2153fd3f46c1457124af35de3e4290140c1e95097f68ff10293b6a8830753 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html 8bf5156c1a55dc145aa28f1ba94a281d6a0bdd39cf4692f11ff5ee8483e296d9 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html e76fafdbbecbf8b460dcd2c37c68525fc948c93f46ef81135217e63e478a00c4 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l2.html 87ff994b7cea26913b8447e9822b2b3f7a92f7ee25754483cc4ae6bbfad04c19 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 5759c07c364eedb2cec77a193b5c2c3770782e94596ac56b38104d451dea231c 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 48cc19d19a6c5c06166f3db1e4a225c1e5881fa8fb04bda3b010466448defcde 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-hipaa.html 16edf183788e3bd0f1d0797ea6db6216f072a0c2f16fd7bf4461b2539114c541 2
@@ -770,5 +770,5 @@
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html 568fc45edd8046078c315f26462d7d165dee52ff5b43080d97add8789a1e0100 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html 97babc963f38325db1cffa9f2929c33e16764ccf103d82c22b9182f94c99377c 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 7f297fed4e09b5799a34a00f79b7d29b00cd60c129719c90bd8e11353da645d4 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html 849cb38f37800ecb2dbf2e657d72ecdd2d64a95e79d8b9b53e1d3be541686f5e 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html 6333f8893e8895e4dfdb3d57a403e9520cbae175e81c754e9b42c1797bf7caa8 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ism_o.html 03e17cfdde6a8c49ce7a49f59e98a177adf5cdcb8dfb140a187a6497f0b5dbbf 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html c932191a006e7bcf2c581cb28434e1100015f1d09b12ab5cd3df54094950dfb1 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 531259834ac0e844863ef692eeb301990ed71671831f95423597d25831f3501d 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig.html 18977f53a4e27d3740ad174204f0f0521ea7ea9aff996a84299c5abefa08e052 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-stig_gui.html 397fef60c29ed2d694eae6a3614f1c3fa71f9d18c76d54c1fefb8f050ac2a31d 2
@@ -776,3 +776,3 @@
-/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html 2750a822bb637724e89b576e64d4fd866f8d94e4ba2d5246e053a162ed93f20a 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html 14a69bf78f1519773a7fab379570f57f5305b8ab4bb2923a0c9bf00a3f918672 2
-/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html f8007797657b4f8a6fcfea56d1d82b4babf0e45ec53c350265c4f5ce28e667b8 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-pci-dss.html 696558067b5a54bfd7c6e592f709a454e97a03ea48c3f21383a0008dd275a9ad 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-stig.html 3a14eb9d4332bb3a726a12a57db2d833bfc2ce7edafbdf6d4bcf086c8137d99a 2
+/usr/share/doc/scap-security-guide/guides/ssg-rhv4-guide-rhvh-vpp.html d550623eae47dde692ebdf56480665e7a7a63c528213f0fe9924ddae0c624613 2
@@ -780,2 +780,2 @@
-/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html a25e77a5ed05445e88a159b0253eff12e90b8099f3eb188b593e1e18085d4e7d 2
-/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html 2803d92c2e88fee9ce511177f84822b74360c6d88c77d8d2db4f8a6da9caa70d 2
+/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 8138d665b7e6c725b43084dfb1b1cc9dad68f0929ecd2c6bd6ae6f2a28232e29 2
+/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-standard.html df84ac048c4bc90d73a1a6d6cf9982189124b0c4178fc8a328cec95c3fc01dcb 2
@@ -783,2 +783,2 @@
-/usr/share/doc/scap-security-guide/tables/table-ol7-anssirefs.html 328cfb4ddd2761dfadb86c80aa70d5becb991c7aeb59e0975ae1b1294bb432be 2
-/usr/share/doc/scap-security-guide/tables/table-ol7-cuirefs.html 693b878b667cb7ce4a2465cb05f628db8760ada64db91230163e8318a732fbc0 2
+/usr/share/doc/scap-security-guide/tables/table-ol7-anssirefs.html 7779bb70fad46c8c49af52d5fc29c6dbae7f8d91943a0a3d230516dd7536549d 2
+/usr/share/doc/scap-security-guide/tables/table-ol7-cuirefs.html 73c338d5cdc28c273e27d6b99e8df5e132401c3da4d4dfdc6f821c089b2ebbed 2
@@ -788,3 +788,3 @@
-/usr/share/doc/scap-security-guide/tables/table-ol7-nistrefs.html e90f57d60cf3ffd51997407f878882dad155e0595a5afd55b8e5e851b7f0acab 2
-/usr/share/doc/scap-security-guide/tables/table-ol7-ospprefs.html bbcd702fe2a451d35d977acfaafe686d293bc661d1fbe488a5d77549e57966f5 2
-/usr/share/doc/scap-security-guide/tables/table-ol7-pcidssrefs.html bc60db7a781756506cb59faabc4264938b07015a897c1976ee8ebad62308192b 2
+/usr/share/doc/scap-security-guide/tables/table-ol7-nistrefs.html 52f5a9986817f9e5afd3c7375e1baeea3a90d72ec3c3ba9c0e479691f9d0a3a5 2
+/usr/share/doc/scap-security-guide/tables/table-ol7-ospprefs.html 24f36ad35336ecd93aae1314bfb6abe34c89d8bdc9a159036995e7f713b9b0bc 2
+/usr/share/doc/scap-security-guide/tables/table-ol7-pcidssrefs.html 910b75eeeb1d21f7000b619ebaf009c93acd137f6ab36d94f8e4aa846327f747 2
@@ -794,2 +794,2 @@
-/usr/share/doc/scap-security-guide/tables/table-ol8-anssirefs.html ed1cf494e8a5b0553718dfc96316921395a79aa56147fc1b4fd1d3304bea6981 2
-/usr/share/doc/scap-security-guide/tables/table-ol8-cuirefs.html 8ff0a40bed2d462406a3bb4a5d5bc2659e25aed814050eb5bf72f47d3acf3bb1 2
+/usr/share/doc/scap-security-guide/tables/table-ol8-anssirefs.html 92bc2e0f6774f9e307ffc4f57ef0b07270fd164ecf6aa02bb2effdf25a83a3aa 2
+/usr/share/doc/scap-security-guide/tables/table-ol8-cuirefs.html ed65fa4d03ab7d879a1acdffbd0a1a7424427ca43c1a175b371211b08366a781 2
@@ -799,2 +799,2 @@
-/usr/share/doc/scap-security-guide/tables/table-ol8-nistrefs.html 4fbe5aec6aa7178a04734c8f761bdabdf5188eaf0c5b6c0de3199a07e3f2d962 2
-/usr/share/doc/scap-security-guide/tables/table-ol8-pcidssrefs.html 5397beb7136231710b51f6f1d149db52735cb28b111963361ba9bdba1d487c1d 2
+/usr/share/doc/scap-security-guide/tables/table-ol8-nistrefs.html daa776a035a17c2ca987a2ad35a48857c294931c4a282d470161b8cd511b4e8d 2
+/usr/share/doc/scap-security-guide/tables/table-ol8-pcidssrefs.html 789b185b145c3edcf3547bbaf000207d0c503800e7fd42327b3563ff6866e196 2
@@ -805 +805 @@
-/usr/share/doc/scap-security-guide/tables/table-rhcos4-nistrefs.html 3b68754b929d6d316c74be49544e67df36fa4ee2536fba6bc05978be2fff5d11 2
+/usr/share/doc/scap-security-guide/tables/table-rhcos4-nistrefs.html 8d4ca6ce45f8cd04988e74fb2ca4b01104d9ff24209c63c8d66bdcec96e2d39c 2
@@ -811 +811 @@
-/usr/share/doc/scap-security-guide/tables/table-rhel7-anssirefs.html 859c399c37312925d00cea1c010a16d3a865b6459bab56621f9a046e464d1a16 2
+/usr/share/doc/scap-security-guide/tables/table-rhel7-anssirefs.html 11bd7f806158ccb1192bc09666f7bd2e47055adf8dd6ceb43a7a68f5e454593a 2
@@ -813,2 +813,2 @@
-/usr/share/doc/scap-security-guide/tables/table-rhel7-cisrefs.html 1a47c9b889d85c4a7ea49e62e6580ed33a1c66d9f0f711cf7f4b0a1546ca5ffa 2
-/usr/share/doc/scap-security-guide/tables/table-rhel7-cuirefs.html 2e4b20e3e5d1ae085bc60241f8d2225c1d6658095ae3d9ec44d0560fc858a701 2
+/usr/share/doc/scap-security-guide/tables/table-rhel7-cisrefs.html 5a4ddee87c1e1d22260b615ffd0a68ebd70a63cc0d7276f9d8e5d6f154052f8d 2
+/usr/share/doc/scap-security-guide/tables/table-rhel7-cuirefs.html 8cd85c2459c924f5219724d4dc1852c51fc8f181b3c7e1a4673fecf881ce04b2 2
@@ -819,3 +819,3 @@
-/usr/share/doc/scap-security-guide/tables/table-rhel7-nistrefs.html 9e06af2146cbb761affcf0d7559d693abd6dd2300c43fe6c0febae512c1b8e94 2
-/usr/share/doc/scap-security-guide/tables/table-rhel7-ospprefs.html f769ac0a37d476604b36020065130118d2f8691db84d3756de8b991756c0d1ca 2
-/usr/share/doc/scap-security-guide/tables/table-rhel7-pcidssrefs.html 71933534fc530e3d3313f4a743139c056ee8189a820e7cc27039d513a5a33739 2
+/usr/share/doc/scap-security-guide/tables/table-rhel7-nistrefs.html 12bd7f16526d0301da205ad5eacd1167bd4f2fddf3fbc86a1d8091d4013bbccd 2
+/usr/share/doc/scap-security-guide/tables/table-rhel7-ospprefs.html 4839aa2d956df2acfa1ad0257235b9436a13b3b5019bc4d1db65c569e6c32753 2
+/usr/share/doc/scap-security-guide/tables/table-rhel7-pcidssrefs.html 8f7d3899ae034c14a97459cc4c2e99381be9aef2cc040285066a59e6637bfdbc 2
@@ -831 +831 @@
-/usr/share/doc/scap-security-guide/tables/table-rhel8-anssirefs.html 64c25d81a3da87853cdcb98f8084f682e789aecfb4aee1e1100cc3203b565630 2
+/usr/share/doc/scap-security-guide/tables/table-rhel8-anssirefs.html c54dab4b06bad172795e143854e27b064d800432cb7511e1086673f1a10df84d 2
@@ -833,2 +833,2 @@
-/usr/share/doc/scap-security-guide/tables/table-rhel8-cisrefs.html 3b8d8b56467717aa26ad3fac65981efab4429df4b8efb5821fc6ea6ccd8cc1bf 2
-/usr/share/doc/scap-security-guide/tables/table-rhel8-cuirefs.html c9205efde44ee3cb8ecd4b2bc33a22a4f925cb973f7b6547399cbb2636978751 2
+/usr/share/doc/scap-security-guide/tables/table-rhel8-cisrefs.html 1583a83cbc2a6e0f1a2b0b8d632e1a0e92661550716e17829bdd61731ad162ef 2
+/usr/share/doc/scap-security-guide/tables/table-rhel8-cuirefs.html dd18fa55593d8905867e76f03c289a46be061231ad63de399fcfc7ff7b76e63e 2
@@ -838,2 +838,2 @@
-/usr/share/doc/scap-security-guide/tables/table-rhel8-nistrefs.html 4f47684e4c314b57790faf918f4eec7b4fb326fc3aaaee1eed398db602d59e16 2
-/usr/share/doc/scap-security-guide/tables/table-rhel8-pcidssrefs.html 57ff2da449cba2c8f1aa337c180b397cba6a16cc11d2d6df9612e8a80e1ad2d7 2
+/usr/share/doc/scap-security-guide/tables/table-rhel8-nistrefs.html 52f275bb5cf8924713758d802eed9f38730905d00689f5dbc205368b07a972e7 2
+/usr/share/doc/scap-security-guide/tables/table-rhel8-pcidssrefs.html d69ca79b900394698a048bd4c34e212e1a13951f7a49d5d48703da35922c90af 2
@@ -1127,2 +1127,2 @@
-/usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 34a506af3316d60ead4c3040b1418b601540cf4ffccee4f8bca88eba25b4e0c8 0
-/usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 74e8018ac455effc9a9d069de9616df8ef1a3965cdddf16cda5d8b057e40545f 0
+/usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 0f399812a1c9c92fd4dda08a80b29681fa97e9472e575cd0f70425a9d8e832e9 0
+/usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml a350d3155a9acab265f0168fc98c4d12a0322adda5a71a0c4d8d4af791874911 0
@@ -1132,9 +1132,9 @@
-/usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml d9f3c0075b65d64d5748185a8ceae67438c28ee374b5b77fb2abdc1a178a4947 0
-/usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml b1eb283377f9fd12b3c3486a1398ff93d537cf8d1a1bcbfcff07a6ab651d53c2 0
-/usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml 6a8349825d56352b174b721ab536d3135472b3d005abe54a29d25ae662c92fae 0
-/usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml a273be76df80751af6d1d1347d48dbbd38c3069161dd44cd56a1d855910baa91 0
-/usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 108173365987ea69c8f5662a230bd1597c50f45988a11329e5980a4b27154651 0
-/usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 961210ead97a7dcd44cb769e041a3fc878e222ab70335beecc379dacf3058409 0
-/usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 15fb7be7603725d0d91a9c817fd762c9be88109079a1a9bbcf822fea053e72ac 0
-/usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 0e63b446e73ffd806feb0dee113dd25c4728eeb8572039c7aea3b11315dc281a 0
-/usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml b397b261ad7cdfb0aaf36a0e6c9cadbff9f839daab25c4de1d97cae2e9e2be5c 0
+/usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml 1b5fa14510f098be12634d8b6665596f31fa2cedb7f59c97d98ba0612b88c22e 0
+/usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml 8f41dda7b73f15ce9337b40ef1e510f931ddd794e1067a7e00c6bd538ca6b840 0
+/usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml a13fc649e2f51bc57ceee5d535fecd5675d9cade6a5a20e007dc3aea7488171a 0
+/usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml db3a9cc00c9dad347497a879c0daac5e2d32967d46cc006c561b716172225cf4 0
+/usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 38dcb39db5e8615444e7bc5a1bed6e2a2462ee127e2b01f1fcccc39d38ed4161 0
+/usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 0819dc02728f8960d02863efd7216ea9852974e6ae3fc358387e56bbc93fb293 0
+/usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 73b4d63df7a27292cd53fdf0c132ea62053fd388d90d51564cbf5e0bdea31989 0
+/usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 7d62f06057bd8becd9c8f82031330db8631044dbce096cd050b8c15e218f5c72 0
+/usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml 34bea2c245fd90bd8504ef5c5c0f4a5a7feecf21705cfec0a7a3e78890f97763 0
@@ -1143,3 +1143,3 @@
-/usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 4b78953deff3060c845786fdb5230648e1b43e1c5c68df5f250a2b606aa10d6b 0
-/usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml a5dd8f8793651c1581c5e924148d8c359ded5472f3f6a5df2f386d24d5ebbc9b 0
-/usr/share/xml/scap/ssg/content/ssg-fedora-ocil.xml b21a9fa23c7ce94583ab7484fd4a2160dd7283409d76410de676e994d2a2ef9e 0
+/usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml f71fd7c217be9c8d49698110b333ba33dd70989909704d4545ff5fb1e3d20e54 0
+/usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml 5ee701db32ec1b225f72da0e10df10ae202017ce6f36d09c7987ffe472e5f4a9 0
+/usr/share/xml/scap/ssg/content/ssg-fedora-ocil.xml 16f3f4fa14740726f5753f34c31e017197cbc40743804375601958a376e0eef8 0
@@ -1147 +1147 @@
-/usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 5e632f85c6b64b9f861971ce1b4ba3ce07d3af7c2f338195522a643fb6ee2c60 0
+/usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 9ee129ec168cdba3e79086317b9853d737d07b14b34dee9b524786db1fcc58bc 0
@@ -1150,3 +1150,3 @@
-/usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml f9776ef6a0408f86df8707b39d13890fb13dfce10a7aa37f1a04f32ce061cd30 0
-/usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml f71a1fcfb2cdcac53303e17b3f76c320c5c1d3ab8f497c334702ff13bf5bb8af 0
-/usr/share/xml/scap/ssg/content/ssg-ol7-ocil.xml 23d869e9e85ae325cf3d566625495683b7769a7ab3228a41f046b35a07ea63e1 0
+/usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml 9ee699876678931100c8dd2709556909bfbf0415d1d5a4b415ad680d0e945b99 0
+/usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml a0bca46b994ce4dfc6fdd8a8375e76ee7f68a4877049243b59f79a1a900b995a 0
+/usr/share/xml/scap/ssg/content/ssg-ol7-ocil.xml e8ffebc43f7d53ddb98ef60fb64ec7e1b3e26aeafe581d08a52e2017bc79ab43 0
@@ -1154 +1154 @@
-/usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml e69e2bce0456234d94a80a86c69d88510ea685e719871205fceac5a3559b82fe 0
+/usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 825ac0bd506d87683901863aab9b6bd94ef7be35abac99f278ab0fe8613ea2da 0
@@ -1157,3 +1157,3 @@
-/usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 996ac2791256a528c3d74507823d34dfe551b25dd779d0fb2c929ca7dfc07a1c 0
-/usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 102eb13cd3e0077b76000bcbea06c80c266a3bfcd32b5950ce0ba0fe0aaa0da1 0
-/usr/share/xml/scap/ssg/content/ssg-ol8-ocil.xml cc239d567b2c21a38d9df746529296050be104fd968d2447dbe266724cef15fc 0
+/usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 48fcc4d7b7a42a0488f96e65bae1154f9e255f2ddcdc5ce207a5a2535f31f66f 0
+/usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 45ba0c3346086b934270076ba90dbbc56bea51944d7b25b2ee672ceb62f9edf5 0
+/usr/share/xml/scap/ssg/content/ssg-ol8-ocil.xml 62f6521b47c1ed48675be99e3a744b951bcc9830c2e9f921711f0a9b409016f6 0
@@ -1161 +1161 @@
-/usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 3baf30367d472baf65148064f1a6dc36547b4bd6c1e623ccd28a351a286a6150 0
+/usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml e3e8de7c6f48ec9183e211ec4356bcffde8df81002641858ae8fc9d006e58964 0
@@ -1164,3 +1164,3 @@
-/usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml eb0db26354499b8ecae5ef2f569c41d531a144aada9b90071e6187c8602a4455 0
-/usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml 9a7470c60b9df69341403f8811dc1749f81854853e21eb9749b83da63f459ede 0
-/usr/share/xml/scap/ssg/content/ssg-ol9-ocil.xml b4367042910e51ee44052f5f7ad3699c98230c2803acc4db649d991baed5c1cf 0
+/usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml 0a519868f2b224b2834e863301754077a0a4c0f03d110ad64edfc12c97967a5d 0
+/usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml db9cfd189af8ac533ef878dabb98fd79cf11ed5d8ddba0438c461037e747b63f 0
+/usr/share/xml/scap/ssg/content/ssg-ol9-ocil.xml 371fc01da02e023ca49ef1a1ed34dc9c7af901f12d728deab136362d87e8a15c 0
@@ -1168 +1168 @@
-/usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml d05cdf53c1789b46b033910c8e9bd81e31d8d8193c1107a1e305ea7cad8cda00 0
+/usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml b3f1ece17a64c53365a3e62047fde42c8584650cb2ea3c4c5bcd529d903d2b09 0
@@ -1171,3 +1171,3 @@
-/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml aeb50a375e6e4edcb46d41fab38fa925e1246a616e7b664804dc6e2daa8b3866 0
-/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 099313265acc53a5cc201268081f4f0ff3c7de03ada798293a17f383e60e6ab2 0
-/usr/share/xml/scap/ssg/content/ssg-rhcos4-ocil.xml 413ee646ad1abb837d061120eb2d0a4b455b8fd19bdfeddc53cf15c610d45df5 0
+/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml 4416f4a2ec26ed4a61a2919a2df4c4c77f99306e31870db889527c8629bd48a1 0
+/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml c9824252d64eb8a7e43ffe8b9427299cf09ae8de0714d14f0ddaf78257f1e9e6 0
+/usr/share/xml/scap/ssg/content/ssg-rhcos4-ocil.xml 4cb577b954b8f02c385d255ccd977999b896a489799a75f7b8bcc80df5a0a6bf 0
@@ -1175 +1175 @@
-/usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml 1ab18d9173180c912131ce9069a22fa32be9120ce1e85296c8d282714b75111b 0
+/usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml 13e02e51a9213bbca2c36acd0a05b9a732585a0c3021f5b5572e0824bc7bd516 0
@@ -1178,3 +1178,3 @@
-/usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml dedaaf0936b6fb44c911405e4c8402560a5fb2cf6156278753ca6f457b696187 0
-/usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml d79688988b6784a48bde50b5b1f44956f5bd76a13c9cf5b05539b94eda83519a 0
-/usr/share/xml/scap/ssg/content/ssg-rhel7-ocil.xml 3db6653c78fc48d5e1c4a40b47123bc48b4aa0613904e01699f56306a364e302 0
+/usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml a84fbe5d8872c6fca43d767d912468e6e9ac2ca22cd0d3e0621ad36682c745b5 0
+/usr/share/xml/scap/ssg/content/ssg-rhel7-ds.xml 081c7211c15c215cc9a294c981cd3443f271033cfeb2d59fad8845f7d27524c6 0
+/usr/share/xml/scap/ssg/content/ssg-rhel7-ocil.xml fc5b2358f89af744d448628aeba9a58c6a369e9b128ad514086c38ec99c39e4f 0
@@ -1182 +1182 @@
-/usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml 685507761e5bdf69c4b1ca33821da447f91aaf050a0fccb37eee284f3417ed1a 0
+/usr/share/xml/scap/ssg/content/ssg-rhel7-xccdf.xml 1a43fd9c80d4718c0d66a9ab223eea6c7c1de8ee89063159b7ff32a236e9abaa 0
@@ -1185,3 +1185,3 @@
-/usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml 6882c3e37b825e46bec0d6e09d081f89601de8a35f2e41eada3a9e74f883566f 0
-/usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml acba16d2b15b8455e5328880569c1f8bfcb8b19de27443b99fc56cc05a1dba86 0
-/usr/share/xml/scap/ssg/content/ssg-rhel8-ocil.xml 14d5cf8f7a60553e02f23dabd0722ea7882fc947adf0d935a2822351d12861ae 0
+/usr/share/xml/scap/ssg/content/ssg-rhel8-ds-1.2.xml 3dbc8b3ddd50360293626d52a7ff60a99f32082d907aa01339fdc681a929e550 0
+/usr/share/xml/scap/ssg/content/ssg-rhel8-ds.xml 84f2326b4db9e24af640ed634923f1c41fcdca17ff635e7fb441ff948242f5e3 0
+/usr/share/xml/scap/ssg/content/ssg-rhel8-ocil.xml 1000e680d6442ca8b77bf61c41f8dfdf9212346641539f8c276995d0acfdd340 0
@@ -1189 +1189 @@
-/usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml 9be5d199cef9a188444a93572af8fe82ed7ba3983569cc027929cac453c2191c 0
+/usr/share/xml/scap/ssg/content/ssg-rhel8-xccdf.xml e9f404e32cec0a62ff5ea9f084284db126eb5a62d5c44d7d411b923e2588431d 0
@@ -1192,3 +1192,3 @@
-/usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml 44147dd69eb0aa19c8c14dc9b848a4c5e5f0e28ee67d3e8b9d7b9ea87e3e4e06 0
-/usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml 5d2ae6f9821fdb4a905f2863e4b4aeb884230cdabe30b3b68fb46281dd06c2c4 0
-/usr/share/xml/scap/ssg/content/ssg-rhel9-ocil.xml 568d0cd9e59475ba85726d4391610917e79ce95a63cafa17895d351f4e33968e 0
+/usr/share/xml/scap/ssg/content/ssg-rhel9-ds-1.2.xml 234bea0ceff98979bbcfd7d0325d8b8432008dbacb9cd388100532bd1ac26931 0
+/usr/share/xml/scap/ssg/content/ssg-rhel9-ds.xml a0c92d86f36fa4efea024daee3f796bc69e5c38d8ccc878919ad1c9b0efce428 0
+/usr/share/xml/scap/ssg/content/ssg-rhel9-ocil.xml 23ce29ed8661ed5e4407a32c3942eafcd890ea65309a712cad66d5cb1af25597 0
@@ -1196 +1196 @@
-/usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml 43112cd84092eeaecc1f772767d4d789f32bd69a944302e742e97a33f33bb7d3 0
+/usr/share/xml/scap/ssg/content/ssg-rhel9-xccdf.xml a999c2a7794b4ed7329353a968a698112ae92fe7cf8bcdc33e2abe5e64847015 0
@@ -1199,3 +1199,3 @@
-/usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml 0fb9a7d2c26d12440b58bb502ae965c9125b3ad19a0e8ff47819c3c9cd268157 0
-/usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml b504928b593e44f09401815abd0d8185c5ff5024999ccc50f372d33f1643c3a0 0
-/usr/share/xml/scap/ssg/content/ssg-rhv4-ocil.xml 2ffa7854edf89b1b56befd9c56dc354f8c84fc05cfa65532d6611e300de5b76d 0
+/usr/share/xml/scap/ssg/content/ssg-rhv4-ds-1.2.xml 1e7ef5e2788395f34e2890466ce54880703838ed904a48168bc980a82ee0f0f7 0
+/usr/share/xml/scap/ssg/content/ssg-rhv4-ds.xml 82390e2d50a8b782c9ad6049de3ba2b021d68668a297eea25b1b49c6687954b5 0
+/usr/share/xml/scap/ssg/content/ssg-rhv4-ocil.xml 5914d87fdb16e22146604e888e0ad9f9b4fcda8c4b1e1f2b96769ae4200fbd85 0
@@ -1203,4 +1203,4 @@
-/usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml 15955d800e68b4e78d6dc89fe0b89bc4cf7982991129f52d35252f11a07ba3f1 0
-/usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml ca6e16d36f41505af11b20bd18ec012208a6e2f268a824e44f54c324e9fef9af 0
-/usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml 880641f378d9aa0d19b00b96c64e659fd4308f3efd6c00299c6533b27106edb8 0
-/usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml 1cf580d66a3dfd4362d3f3206d3fafc154e78fdf91b517ab24209a840582ffce 0
+/usr/share/xml/scap/ssg/content/ssg-rhv4-xccdf.xml 0fe5b9cf777b352d32407bd156b38cc176b458e033aaae4e1820dd73d0e2e17d 0
+/usr/share/xml/scap/ssg/content/ssg-sl7-ds-1.2.xml 208e3672d18aaa2132e8a08587fd6ddd2b97b553dcdbcef9671f0d2912bf74b4 0
+/usr/share/xml/scap/ssg/content/ssg-sl7-ds.xml 51d5c8874d0eabea3100cf02b351cd95d4fcf704400dcc66a1e7d572427fb03f 0
+/usr/share/xml/scap/ssg/content/ssg-sl7-xccdf.xml e3a9ee0589607f4081620b369c921b5fe8a3ed8b3ab1d81eed7e2b8e555c43aa 0
comparing rpmtags
comparing RELEASE
comparing PROVIDES
comparing scripts
comparing filelist
comparing file checksum
creating rename script
RPM file checksum differs.
Extracting packages
/usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-centos7-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -443,17 +443,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4542,7 +4542,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, SV-204424r809187_rule | | |
| Group
System Accounting with auditd
Group contains 9 groups and 41 rules | [ref]
@@ -16382,7 +16382,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
| Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -17072,7 +17072,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
| Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -17743,7 +17743,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, SV-204424r809187_rule | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 1 rule | [ref]
@@ -12332,7 +12332,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
| Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -13022,7 +13022,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
| Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -13693,7 +13693,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, SV-244540r743869_rule | | |
| Group
System Accounting with auditd
Group contains 9 groups and 57 rules | [ref]
@@ -29060,7 +29060,21 @@
add the line to file /etc/audit/audit.rules . | Rationale: | The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, 4.1.15, SV-230446r627750_rule | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, SV-244540r743869_rule | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 1 rule | [ref]
@@ -16156,7 +16156,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | |
| Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -16846,7 +16846,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | |
| Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -17517,7 +17517,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules | [ref]
@@ -5932,7 +5932,21 @@
daily | Rationale: | Log files that are not properly rotated run the risk of growing so large
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated | Identifiers and References | References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7 | | |
| Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules | [ref]
@@ -6173,17 +6173,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
@@ -136,17 +136,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -698,17 +698,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1024,17 +1024,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4949,7 +4949,21 @@
authentication to privileged accounts. Users will first login, then escalate
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
| Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules | [ref]
@@ -6250,7 +6250,21 @@
daily | Rationale: | Log files that are not properly rotated run the risk of growing so large
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated | Identifiers and References | References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7 | | |
| Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules | [ref]
@@ -6491,17 +6491,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
@@ -136,17 +136,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -425,17 +425,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -751,17 +751,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4676,7 +4676,21 @@
authentication to privileged accounts. Users will first login, then escalate
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
| Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 2 rules | [ref]
@@ -5569,7 +5569,21 @@
daily | Rationale: | Log files that are not properly rotated run the risk of growing so large
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated | Identifiers and References | References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7 | | |
| Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules | [ref]
@@ -5810,17 +5810,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
@@ -242,17 +242,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4156,17 +4156,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4198,10 +4198,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4209,6 +4206,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
@@ -132,17 +132,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -599,17 +599,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -25557,7 +25557,21 @@
add the line to file /etc/audit/audit.rules .
| Rationale: | The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
| Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -26219,7 +26219,21 @@
add the line to file /etc/audit/audit.rules . | Rationale: | The addition of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
| Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules | [ref]
@@ -27476,7 +27476,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20adjtimex%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20adjtimex%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-adjtimex.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -27816,7 +27830,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
package_facts:
manager: auto
tags:
@@ -28129,20 +28143,6 @@
- medium_severity
- no_reboot_needed
- restrict_strategy
-
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
-apiVersion: machineconfiguration.openshift.io/v1
-kind: MachineConfig
-spec:
- config:
- ignition:
- version: 3.1.0
- storage:
- files:
- - contents:
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -132,17 +132,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -524,17 +524,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4465,17 +4465,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4507,10 +4507,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4518,6 +4515,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -4665,17 +4665,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -4707,10 +4707,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -4718,6 +4715,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -4800,7 +4800,21 @@
Configure Accepting Router Advertisements on All IPv6 Interfaces
[ref]
| To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 | Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra | Identifiers and References | References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | | |
| Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
+ [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
+To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | References:
+ BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | |
| Rule
- Disable Accepting ICMP Redirects for All IPv6 Interfaces
- [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | References:
- BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Reboot: | true |
---|
Strategy: | disable |
---|
# Remediation is applicable only in certain platforms
+
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Reboot: | true |
---|
Strategy: | disable |
---|
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -132,17 +132,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -524,17 +524,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4465,17 +4465,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4507,10 +4507,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4518,6 +4515,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -4665,17 +4665,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -4707,10 +4707,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -4718,6 +4715,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -4800,7 +4800,21 @@
Configure Accepting Router Advertisements on All IPv6 Interfaces
[ref]
| To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 | Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra | Identifiers and References | References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | | |
| Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
+ [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
+To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | References:
+ BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | |
| Rule
- Disable Accepting ICMP Redirects for All IPv6 Interfaces
- [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | References:
- BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | | Rationale: | The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
| Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -26219,7 +26219,21 @@
add the line to file /etc/audit/audit.rules . | Rationale: | The addition of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
| Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules | [ref]
@@ -27476,7 +27476,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20adjtimex%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20adjtimex%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-adjtimex.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -27816,7 +27830,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
package_facts:
manager: auto
tags:
@@ -28129,20 +28143,6 @@
- medium_severity
- no_reboot_needed
- restrict_strategy
-
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
-apiVersion: machineconfiguration.openshift.io/v1
-kind: MachineConfig
-spec:
- config:
- ignition:
- version: 3.1.0
- storage:
- files:
- - contents:
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
@@ -146,17 +146,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -252,17 +252,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -717,17 +717,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -762,17 +762,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -797,17 +797,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -838,17 +838,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -881,17 +881,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
class install_subscription-manager {
package { 'subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure subscription-manager is installed
package:
name: subscription-manager
@@ -1041,17 +1041,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4098,17 +4098,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
@@ -795,17 +795,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rear
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rear"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
class install_rear {
package { 'rear':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rear"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rear is installed
package:
name: rear
@@ -1361,7 +1361,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
| Group
Restrict Root Logins
Group contains 1 rule | [ref]
@@ -7993,7 +7993,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | |
| Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -8683,7 +8683,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | |
| Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -9354,7 +9354,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | | Rationale: | This prevents attackers with physical access from trivially bypassing security
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
| Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1346,7 +1346,21 @@
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
| Rule
Disable Ctrl-Alt-Del Reboot Activation
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1409,16 +1409,7 @@
can reboot the system. If accidentally pressed, as could happen in
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
| Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux 9 systems support an "interactive boot" option that can
@@ -1653,7 +1653,26 @@
a container anyway. | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
| Group
Restrict Root Logins
Group contains 2 rules | [ref]
@@ -11487,7 +11487,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | |
| Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -12177,7 +12177,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
@@ -136,17 +136,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -242,17 +242,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -707,17 +707,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -752,17 +752,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -787,17 +787,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -828,17 +828,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -871,17 +871,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
class install_subscription-manager {
package { 'subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure subscription-manager is installed
package:
name: subscription-manager
@@ -1031,17 +1031,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4088,17 +4088,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
/usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-cs9-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -305,17 +305,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4347,17 +4347,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -4389,17 +4389,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pcsc-lite
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pcsc-lite"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
class install_pcsc-lite {
package { 'pcsc-lite':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pcsc-lite"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pcsc-lite is installed
package:
name: pcsc-lite
@@ -4438,10 +4438,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["pcscd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
class enable_pcscd {
service {'pcscd':
@@ -4449,6 +4446,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["pcscd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service pcscd
block:
@@ -4830,7 +4830,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
| Group
System Accounting with auditd
Group contains 9 groups and 57 rules | [ref]
@@ -28626,7 +28626,21 @@
add the line to file /etc/audit/audit.rules . | Rationale: | The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | | Rationale: | Not listing tmux among permitted shells
prevents malicious program running as user
from lowering security by disabling the screen lock. | Severity: | low | Rule ID: | xccdf_org.ssgproject.content_rule_no_tmux_in_shells | Identifiers and References | References:
- CCI-000056, CM-6, FMT_SMF_EXT.1, SRG-OS-000324-GPOS-00125, SRG-OS-000028-GPOS-00009 | | |
| Group
Hardware Tokens for Authentication
Group contains 2 rules | [ref]
@@ -8800,17 +8800,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -8853,17 +8853,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
| Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -8879,7 +8879,18 @@
$ sudo systemctl mask --now debug-shell.service | Rationale: | This prevents attackers with physical access from trivially bypassing security
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | | Rationale: | Not listing tmux among permitted shells
prevents malicious program running as user
from lowering security by disabling the screen lock. | Severity: | low | Rule ID: | xccdf_org.ssgproject.content_rule_no_tmux_in_shells | Identifiers and References | References:
- CCI-000056, CM-6, FMT_SMF_EXT.1, SRG-OS-000324-GPOS-00125, SRG-OS-000028-GPOS-00009 | | |
| Group
Hardware Tokens for Authentication
Group contains 2 rules | [ref]
@@ -8806,17 +8806,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -8859,17 +8859,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
| Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -8885,7 +8885,18 @@
$ sudo systemctl mask --now debug-shell.service | Rationale: | This prevents attackers with physical access from trivially bypassing security
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | | Rationale: | This prevents attackers with physical access from trivially bypassing security
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
| Rule
Verify that Interactive Boot is Disabled
[ref] | Fedora systems support an "interactive boot" option that can
@@ -5561,7 +5561,26 @@
a container anyway. | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 rule | [ref]
@@ -50634,7 +50634,21 @@
add the line to file /etc/audit/audit.rules . | Rationale: | The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
| Group
System Accounting with auditd
Group contains 9 groups and 57 rules | [ref]
@@ -25239,7 +25239,21 @@
add the line to file /etc/audit/audit.rules . | Rationale: | The removal of kernel modules can be used to alter the behavior of
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
| Rule
Ensure auditd Collects Information on Kernel Module Loading and Unloading - finit_module
[ref] | If the auditd daemon is configured to use the augenrules program
/usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-fedora-guide-standard.html 2022-07-15 00:00:00.000000000 +0000
@@ -1772,7 +1772,26 @@
a container anyway. | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
| Rule
Verify No netrc Files Exist
[ref] | The .netrc files contain login information
@@ -2024,7 +2024,21 @@
authentication to privileged accounts. Users will first login, then escalate
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 | | |
| Rule
Restrict Serial Port Root Logins
[ref] | To restrict root logins on serial ports,
@@ -12823,7 +12823,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | |
| Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -13513,7 +13513,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20clock_settime%20-F%20a0%3D0x0%20-k%20time-change%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20clock_settime%20-F%20a0%3D0x0%20-k%20time-change%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-clock-settime.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# First perform the remediation of the syscall rule
@@ -13841,7 +13855,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_enhanced.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -416,17 +416,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -6205,17 +6205,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -6247,10 +6247,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -6258,6 +6255,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -15143,17 +15143,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=chrony
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "chrony"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
class install_chrony {
package { 'chrony':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "chrony"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure chrony is installed
package:
name: chrony
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_high.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -738,17 +738,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -6629,17 +6629,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -6671,10 +6671,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -6682,6 +6679,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -16009,17 +16009,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=chrony
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "chrony"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
class install_chrony {
package { 'chrony':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "chrony"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure chrony is installed
package:
name: chrony
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -416,17 +416,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5839,17 +5839,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5881,10 +5881,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5892,6 +5889,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -14604,17 +14604,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=chrony
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "chrony"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
class install_chrony {
package { 'chrony':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "chrony"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure chrony is installed
package:
name: chrony
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-anssi_nt28_minimal.html 2022-07-15 00:00:00.000000000 +0000
@@ -3955,17 +3955,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -3997,10 +3997,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4008,6 +4005,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cjis.html 2022-07-15 00:00:00.000000000 +0000
@@ -438,17 +438,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -2810,7 +2810,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 rule | [ref]
@@ -23458,7 +23458,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -23940,10 +23940,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -23951,6 +23948,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
@@ -3512,17 +3512,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=screen
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "screen"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_screen
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_screen
class install_screen {
package { 'screen':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "screen"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure screen is installed
package:
name: screen
@@ -3573,10 +3573,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -3584,6 +3581,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -4098,7 +4098,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
Restrict Root Logins
Group contains 1 rule | [ref]
@@ -4887,7 +4887,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -5498,10 +5498,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5509,6 +5506,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -8905,10 +8905,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
@@ -793,17 +793,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rear
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rear"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
class install_rear {
package { 'rear':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rear"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rear is installed
package:
name: rear
@@ -1232,7 +1232,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
Restrict Root Logins
Group contains 1 rule | [ref]
@@ -14311,7 +14311,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Group
Configure Syslog
Group contains 2 rules | [ref]
@@ -14444,17 +14444,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -14486,10 +14486,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -14497,6 +14494,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -14644,17 +14644,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-hipaa.html 2022-07-15 00:00:00.000000000 +0000
@@ -1145,10 +1145,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -1156,6 +1153,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -1566,7 +1566,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
Restrict Root Logins
Group contains 3 rules | [ref]
@@ -43310,7 +43310,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -43992,10 +43992,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -44003,6 +44000,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -44985,10 +44985,7 @@
fi
Remediation Anaconda snippet ⇲ Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["kdump"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_kdump
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_kdump
class disable_kdump {
service {'kdump':
@@ -44996,6 +44993,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["kdump"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service kdump
block:
@@ -45087,10 +45087,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["crond"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_crond
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_crond
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
@@ -3503,17 +3503,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=screen
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "screen"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_screen
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_screen
class install_screen {
package { 'screen':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "screen"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure screen is installed
package:
name: screen
@@ -3564,10 +3564,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -3575,6 +3572,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -4089,7 +4089,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
Restrict Root Logins
Group contains 1 rule | [ref]
@@ -4878,7 +4878,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -5489,10 +5489,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5500,6 +5497,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -8896,10 +8896,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -434,17 +434,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4479,7 +4479,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
System Accounting with auditd
Group contains 9 groups and 41 rules | [ref]
@@ -25004,7 +25004,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -25790,17 +25790,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=libreswan
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "libreswan"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_libreswan
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_libreswan
class install_libreswan {
package { 'libreswan':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "libreswan"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure libreswan is installed
package:
name: libreswan
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-sap.html 2022-07-15 00:00:00.000000000 +0000
@@ -100,17 +100,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=glibc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "glibc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_glibc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_glibc
class install_glibc {
package { 'glibc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "glibc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure glibc is installed
package:
name: glibc
@@ -140,17 +140,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=uuidd
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "uuidd"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_uuidd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_uuidd
class install_uuidd {
package { 'uuidd':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "uuidd"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure uuidd is installed
package:
name: uuidd
@@ -518,10 +518,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["rlogin"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rlogin
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rlogin
class disable_rlogin {
service {'rlogin':
@@ -529,6 +526,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["rlogin"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service rlogin
block:
@@ -631,10 +631,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["rsh"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rsh
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_rsh
class disable_rsh {
service {'rsh':
@@ -642,6 +639,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["rsh"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service rsh
block:
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-standard.html 2022-07-15 00:00:00.000000000 +0000
@@ -735,7 +735,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 2 rules | [ref]
@@ -28490,17 +28490,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -28532,10 +28532,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -28543,6 +28540,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -28750,10 +28750,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -28761,6 +28758,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -29230,10 +29230,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["abrtd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_abrtd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_abrtd
class disable_abrtd {
service {'abrtd':
@@ -29241,6 +29238,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["abrtd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service abrtd
block:
@@ -29332,10 +29332,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["ntpdate"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_ntpdate
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_ntpdate
class disable_ntpdate {
service {'ntpdate':
@@ -29343,6 +29340,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["ntpdate"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service ntpdate
block:
@@ -29436,10 +29436,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["oddjobd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_oddjobd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_oddjobd
class disable_oddjobd {
service {'oddjobd':
@@ -29447,6 +29444,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["oddjobd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service oddjobd
block:
@@ -29541,10 +29541,7 @@
else
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig.html 2022-07-15 00:00:00.000000000 +0000
@@ -558,17 +558,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -8716,17 +8716,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pam_pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_pkcs11
class install_pam_pkcs11 {
package { 'pam_pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_pkcs11"
+version = "*"
|
| Rule
Enable Smart Card Login
[ref] | To enable smart card authentication, consult the documentation at:
@@ -9365,7 +9365,26 @@
a container anyway. | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Rule
Ensure There Are No Accounts With Blank or Null Passwords
[ref] | Check the "/etc/shadow" file for blank passwords with the
@@ -47845,7 +47845,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Group
GRUB2 bootloader configuration
Group contains 2 groups and 6 rules | [ref]
@@ -48373,10 +48373,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -48384,6 +48381,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -50327,10 +50327,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
/usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol7-guide-stig_gui.html 2022-07-15 00:00:00.000000000 +0000
@@ -564,17 +564,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -8722,17 +8722,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pam_pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pam_pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pam_pkcs11
class install_pam_pkcs11 {
package { 'pam_pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pam_pkcs11"
+version = "*"
|
| Rule
Enable Smart Card Login
[ref] | To enable smart card authentication, consult the documentation at:
@@ -9371,7 +9371,26 @@
a container anyway. | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL07-00-010290, SV-221687r809141_rule | | |
| Rule
Ensure There Are No Accounts With Blank or Null Passwords
[ref] | Check the "/etc/shadow" file for blank passwords with the
@@ -47851,7 +47851,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL07-00-030000, SV-221764r603260_rule | | |
| Group
GRUB2 bootloader configuration
Group contains 2 groups and 6 rules | [ref]
@@ -48379,10 +48379,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -48390,6 +48387,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -50333,10 +50333,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_enhanced.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -416,17 +416,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -982,17 +982,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -6414,17 +6414,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
@@ -6454,17 +6454,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -6497,10 +6497,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -6508,6 +6505,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -15461,17 +15461,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=chrony
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "chrony"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
class install_chrony {
package { 'chrony':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "chrony"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure chrony is installed
package:
name: chrony
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -733,17 +733,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1299,17 +1299,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -6776,17 +6776,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
@@ -6816,17 +6816,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -6859,10 +6859,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -6870,6 +6867,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -16263,17 +16263,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=chrony
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "chrony"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
class install_chrony {
package { 'chrony':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "chrony"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure chrony is installed
package:
name: chrony
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -416,17 +416,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -982,17 +982,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -6047,17 +6047,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
@@ -6087,17 +6087,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -6130,10 +6130,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -6141,6 +6138,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -14918,17 +14918,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=chrony
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "chrony"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_chrony
class install_chrony {
package { 'chrony':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "chrony"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure chrony is installed
package:
name: chrony
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
@@ -237,17 +237,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4139,17 +4139,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4182,10 +4182,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4193,6 +4190,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cjis.html 2022-07-15 00:00:00.000000000 +0000
@@ -430,17 +430,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -2886,7 +2886,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 rule |
[ref]
@@ -23538,7 +23538,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL08-00-030181, SV-248520r779126_rule |
|
|
Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -24051,10 +24051,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -24062,6 +24059,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
@@ -137,17 +137,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -431,17 +431,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -993,17 +993,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1038,17 +1038,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -1073,17 +1073,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -1114,17 +1114,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -1506,17 +1506,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4525,17 +4525,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "tmux"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure tmux is installed
package:
name: tmux
@@ -4751,10 +4751,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -4762,6 +4759,9 @@
ensure => 'stopped',
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
@@ -917,17 +917,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rear
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rear"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
class install_rear {
package { 'rear':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rear"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rear is installed
package:
name: rear
@@ -1407,7 +1407,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule | | |
|
Group
Restrict Root Logins
Group contains 1 rule |
[ref]
@@ -14054,7 +14054,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL08-00-030181, SV-248520r779126_rule |
|
|
Group
Configure Syslog
Group contains 2 rules |
[ref]
@@ -14187,17 +14187,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -14230,10 +14230,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -14241,6 +14238,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -14389,17 +14389,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-hipaa.html 2022-07-15 00:00:00.000000000 +0000
@@ -1272,10 +1272,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -1283,6 +1280,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -1697,7 +1697,26 @@
a container anyway.
|
Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. |
Severity: | high |
Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords |
Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule |
|
|
Group
Restrict Root Logins
Group contains 3 rules |
[ref]
@@ -43447,7 +43447,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL08-00-030181, SV-248520r779126_rule |
|
|
Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -44205,10 +44205,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -44216,6 +44213,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -45199,10 +45199,7 @@
fi
Remediation Anaconda snippet ⇲ Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["kdump"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_kdump
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_kdump
class disable_kdump {
service {'kdump':
@@ -45210,6 +45207,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["kdump"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service kdump
block:
@@ -45301,10 +45301,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["crond"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_crond
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_crond
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -422,17 +422,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -984,17 +984,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1029,17 +1029,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -1064,17 +1064,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -1105,17 +1105,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -1497,17 +1497,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4516,17 +4516,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "tmux"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure tmux is installed
package:
name: tmux
@@ -4742,10 +4742,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -4753,6 +4750,9 @@
ensure => 'stopped',
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -426,17 +426,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4385,17 +4385,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -4428,17 +4428,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pcsc-lite
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pcsc-lite"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
class install_pcsc-lite {
package { 'pcsc-lite':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pcsc-lite"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pcsc-lite is installed
package:
name: pcsc-lite
@@ -4477,10 +4477,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["pcscd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
class enable_pcscd {
service {'pcscd':
@@ -4488,6 +4485,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["pcscd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service pcscd
block:
@@ -4992,7 +4992,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule | | |
|
Group
System Accounting with auditd
Group contains 9 groups and 57 rules |
[ref]
@@ -37898,17 +37898,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=audispd-plugins
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audispd-plugins"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audispd-plugins
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audispd-plugins
class install_audispd-plugins {
package { 'audispd-plugins':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audispd-plugins"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audispd-plugins is installed
package:
name: audispd-plugins
@@ -37936,7 +37936,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190, OL08-00-030181, SV-248520r779126_rule |
|
|
Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. |
Severity: | high |
Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords |
Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 2 rules |
[ref]
@@ -28824,17 +28824,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -28867,10 +28867,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -28878,6 +28875,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -29088,10 +29088,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -29099,6 +29096,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -29568,10 +29568,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["abrtd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_abrtd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_abrtd
class disable_abrtd {
service {'abrtd':
@@ -29579,6 +29576,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["abrtd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service abrtd
block:
@@ -29670,10 +29670,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["ntpdate"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_ntpdate
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_ntpdate
class disable_ntpdate {
service {'ntpdate':
@@ -29681,6 +29678,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["ntpdate"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service ntpdate
block:
@@ -29774,10 +29774,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["oddjobd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_oddjobd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_oddjobd
class disable_oddjobd {
service {'oddjobd':
@@ -29785,6 +29782,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["oddjobd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service oddjobd
block:
@@ -29879,10 +29879,7 @@
else
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig.html 2022-07-15 00:00:00.000000000 +0000
@@ -122,17 +122,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -3549,17 +3549,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rng-tools
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rng-tools"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rng-tools
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rng-tools
class install_rng-tools {
package { 'rng-tools':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rng-tools"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rng-tools is installed
package:
name: rng-tools
@@ -8383,17 +8383,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "tmux"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure tmux is installed
package:
name: tmux
@@ -8599,17 +8599,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=kbd
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "kbd"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
class install_kbd {
package { 'kbd':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "kbd"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure kbd is installed
package:
name: kbd
@@ -8657,17 +8657,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -8711,17 +8711,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -8757,10 +8757,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -8768,6 +8765,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -10109,7 +10109,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule | | Remediation Kubernetes snippet ⇲---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/password-auth
+ overwrite: true
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/system-auth
+ overwrite: true
+
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Strategy: | configure |
---|
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
SYSTEM_AUTH="/etc/pam.d/system-auth"
@@ -10134,7 +10153,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Strategy: | configure |
---|
- name: Check if system relies on authselect
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Strategy: | configure |
---|
- name: Check if system relies on authselect
ansible.builtin.stat:
path: /usr/bin/authselect
register: result_authselect_present
@@ -10285,25 +10304,6 @@
/usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-ol8-guide-stig_gui.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -3555,17 +3555,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rng-tools
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rng-tools"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rng-tools
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rng-tools
class install_rng-tools {
package { 'rng-tools':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rng-tools"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rng-tools is installed
package:
name: rng-tools
@@ -8389,17 +8389,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "tmux"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure tmux is installed
package:
name: tmux
@@ -8605,17 +8605,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=kbd
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "kbd"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_kbd
class install_kbd {
package { 'kbd':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "kbd"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure kbd is installed
package:
name: kbd
@@ -8663,17 +8663,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -8717,17 +8717,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
|
Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -8763,10 +8763,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["debug-shell"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_debug-shell
class disable_debug-shell {
service {'debug-shell':
@@ -8774,6 +8771,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["debug-shell"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service debug-shell
block:
@@ -10115,7 +10115,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, OL08-00-020331, SV-248715r779711_rule | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 2 rules |
[ref]
@@ -28700,17 +28700,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -28742,10 +28742,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -28753,6 +28750,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -28960,10 +28960,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["autofs"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_autofs
class disable_autofs {
service {'autofs':
@@ -28971,6 +28968,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["autofs"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service autofs
block:
@@ -29427,10 +29427,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["abrtd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_abrtd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_abrtd
class disable_abrtd {
service {'abrtd':
@@ -29438,6 +29435,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["abrtd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service abrtd
block:
@@ -29529,10 +29529,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["ntpdate"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_ntpdate
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_ntpdate
class disable_ntpdate {
service {'ntpdate':
@@ -29540,6 +29537,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["ntpdate"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service ntpdate
block:
@@ -29633,10 +29633,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["oddjobd"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_oddjobd
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include disable_oddjobd
class disable_oddjobd {
service {'oddjobd':
@@ -29644,6 +29641,9 @@
ensure => 'stopped',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+disabled = ["oddjobd"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | disable |
---|
- name: Disable service oddjobd
block:
@@ -29738,10 +29738,7 @@
else
/usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhcos4-guide-high.html 2022-07-15 00:00:00.000000000 +0000
@@ -552,7 +552,8 @@
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled |
Identifiers and References | Identifiers:
CCE-82496-1 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 |
|
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux CoreOS 4 systems support an "interactive boot" option that can
@@ -6638,7 +6638,7 @@
connections to Bluetooth devices, which entails some security risk.
Nevertheless, variation in this risk decision may be expected due to the
utility of Bluetooth connectivity and its limited range. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_bluetooth_disabled | Identifiers and References | References:
- 11, 12, 14, 15, 3, 8, 9, APO13.01, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS01.04, DSS05.02, DSS05.03, DSS05.05, DSS06.06, 3.1.16, CCI-000085, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 7.1, SR 7.6, A.11.2.6, A.12.1.2, A.12.5.1, A.12.6.2, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.2, A.14.2.3, A.14.2.4, A.6.2.1, A.6.2.2, A.9.1.2, AC-18(a), AC-18(3), CM-7(a), CM-7(b), CM-6(a), MP-7, PR.AC-3, PR.IP-1, PR.PT-3, PR.PT-4 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_autofs_disabled | Identifiers and References | Identifiers:
CCE-82663-6 References:
- 1, 12, 15, 16, 5, APO13.01, DSS01.04, DSS05.03, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.4.6, CCI-000366, CCI-000778, CCI-001958, 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.6, A.11.2.6, A.13.1.1, A.13.2.1, A.18.1.4, A.6.2.1, A.6.2.2, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CM-7(a), CM-7(b), CM-6(a), MP-7, PR.AC-1, PR.AC-3, PR.AC-6, PR.AC-7, SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Booting from USB Devices in Boot Firmware
[ref] | Configure the system boot firmware (historically called BIOS on PC
@@ -7234,7 +7234,7 @@
terminates an application. The memory image could contain sensitive data
and is generally useful only for developers trying to debug problems. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_systemd-coredump_disabled | Identifiers and References | Identifiers:
CCE-82530-7 References:
- CCI-000366, SC-7(10), FMT_SMF_EXT.1, SRG-OS-000480-GPOS-00227 | | | Rationale: | | Severity: | unknown | Rule ID: | xccdf_org.ssgproject.content_rule_service_sshd_disabled | Identifiers and References | References:
- CM-3(6), IA-2(4) | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-82496-1 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux CoreOS 4 systems support an "interactive boot" option that can
@@ -6638,7 +6638,7 @@
connections to Bluetooth devices, which entails some security risk.
Nevertheless, variation in this risk decision may be expected due to the
utility of Bluetooth connectivity and its limited range. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_bluetooth_disabled | Identifiers and References | References:
- 11, 12, 14, 15, 3, 8, 9, APO13.01, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS01.04, DSS05.02, DSS05.03, DSS05.05, DSS06.06, 3.1.16, CCI-000085, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 7.1, SR 7.6, A.11.2.6, A.12.1.2, A.12.5.1, A.12.6.2, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.2, A.14.2.3, A.14.2.4, A.6.2.1, A.6.2.2, A.9.1.2, AC-18(a), AC-18(3), CM-7(a), CM-7(b), CM-6(a), MP-7, PR.AC-3, PR.IP-1, PR.PT-3, PR.PT-4 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_autofs_disabled | Identifiers and References | Identifiers:
CCE-82663-6 References:
- 1, 12, 15, 16, 5, APO13.01, DSS01.04, DSS05.03, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.4.6, CCI-000366, CCI-000778, CCI-001958, 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.6, A.11.2.6, A.13.1.1, A.13.2.1, A.18.1.4, A.6.2.1, A.6.2.2, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CM-7(a), CM-7(b), CM-6(a), MP-7, PR.AC-1, PR.AC-3, PR.AC-6, PR.AC-7, SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Booting from USB Devices in Boot Firmware
[ref] | Configure the system boot firmware (historically called BIOS on PC
@@ -7234,7 +7234,7 @@
terminates an application. The memory image could contain sensitive data
and is generally useful only for developers trying to debug problems. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_systemd-coredump_disabled | Identifiers and References | Identifiers:
CCE-82530-7 References:
- CCI-000366, SC-7(10), FMT_SMF_EXT.1, SRG-OS-000480-GPOS-00227 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-82496-1 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux CoreOS 4 systems support an "interactive boot" option that can
@@ -6627,7 +6627,7 @@
connections to Bluetooth devices, which entails some security risk.
Nevertheless, variation in this risk decision may be expected due to the
utility of Bluetooth connectivity and its limited range. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_bluetooth_disabled | Identifiers and References | References:
- 11, 12, 14, 15, 3, 8, 9, APO13.01, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS01.04, DSS05.02, DSS05.03, DSS05.05, DSS06.06, 3.1.16, CCI-000085, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 7.1, SR 7.6, A.11.2.6, A.12.1.2, A.12.5.1, A.12.6.2, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.2, A.14.2.3, A.14.2.4, A.6.2.1, A.6.2.2, A.9.1.2, AC-18(a), AC-18(3), CM-7(a), CM-7(b), CM-6(a), MP-7, PR.AC-3, PR.IP-1, PR.PT-3, PR.PT-4 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_autofs_disabled | Identifiers and References | Identifiers:
CCE-82663-6 References:
- 1, 12, 15, 16, 5, APO13.01, DSS01.04, DSS05.03, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.4.6, CCI-000366, CCI-000778, CCI-001958, 164.308(a)(3)(i), 164.308(a)(3)(ii)(A), 164.310(d)(1), 164.310(d)(2), 164.312(a)(1), 164.312(a)(2)(iv), 164.312(b), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.6, A.11.2.6, A.13.1.1, A.13.2.1, A.18.1.4, A.6.2.1, A.6.2.2, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CM-7(a), CM-7(b), CM-6(a), MP-7, PR.AC-1, PR.AC-3, PR.AC-6, PR.AC-7, SRG-OS-000114-GPOS-00059, SRG-OS-000378-GPOS-00163, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Booting from USB Devices in Boot Firmware
[ref] | Configure the system boot firmware (historically called BIOS on PC
@@ -7223,7 +7223,7 @@
terminates an application. The memory image could contain sensitive data
and is generally useful only for developers trying to debug problems. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_systemd-coredump_disabled | Identifiers and References | Identifiers:
CCE-82530-7 References:
- CCI-000366, SC-7(10), FMT_SMF_EXT.1, SRG-OS-000480-GPOS-00227 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-82496-1 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -3073,7 +3073,7 @@
terminates an application. The memory image could contain sensitive data
and is generally useful only for developers trying to debug problems. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_systemd-coredump_disabled | Identifiers and References | Identifiers:
CCE-82530-7 References:
- CCI-000366, SC-7(10), FMT_SMF_EXT.1, SRG-OS-000480-GPOS-00227 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | Identifiers:
CCE-27294-8 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.5 | | |
|
Rule
Ensure that System Accounts Do Not Run a Shell Upon Login
[ref] | Some accounts are not associated with a human user of the system, and exist to
@@ -25991,7 +25991,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex | Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -26686,7 +26686,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-27219-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -27362,7 +27362,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-27216-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | Identifiers:
CCE-27294-8 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.5 | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules |
[ref]
@@ -6436,7 +6436,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-80195-1 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7, 4.3 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -6686,17 +6686,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
@@ -6727,17 +6727,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_high.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -807,17 +807,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5419,7 +5419,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-27294-8 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.5 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules |
[ref]
@@ -6877,7 +6877,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-80195-1 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7, 4.3 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -7127,17 +7127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
@@ -7168,17 +7168,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -474,17 +474,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5086,7 +5086,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-27294-8 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.5 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 2 rules |
[ref]
@@ -6055,7 +6055,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-80195-1 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7, 4.3 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -6305,17 +6305,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
@@ -6346,17 +6346,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-anssi_nt28_minimal.html 2022-07-15 00:00:00.000000000 +0000
@@ -4197,17 +4197,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4241,10 +4241,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4252,6 +4249,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -804,17 +804,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -22802,7 +22802,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-80415-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030830, 4.1.16, SV-204562r603261_rule |
|
|
Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -23473,7 +23473,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | Identifiers:
CCE-80414-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030820, 4.1.16, SV-204560r809822_rule | | |
|
Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules |
[ref]
@@ -25791,7 +25791,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20adjtimex%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20adjtimex%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-adjtimex.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -26131,7 +26145,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
package_facts:
manager: auto
tags:
@@ -26448,20 +26462,6 @@
- medium_severity
- no_reboot_needed
- restrict_strategy
-
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
-apiVersion: machineconfiguration.openshift.io/v1
-kind: MachineConfig
-spec:
- config:
- ignition:
- version: 3.1.0
- storage:
- files:
- - contents:
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -724,17 +724,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5108,17 +5108,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5152,10 +5152,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5163,6 +5160,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -5312,17 +5312,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -5356,10 +5356,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5367,6 +5364,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -5467,17 +5467,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=iptables
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "iptables"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure iptables is installed
package:
name: iptables
@@ -5511,7 +5511,21 @@
[ref]
|
To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 |
Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra |
Identifiers and References | Identifiers:
CCE-80180-3 References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, 3.3.9 |
|
|
Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -724,17 +724,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5108,17 +5108,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5152,10 +5152,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5163,6 +5160,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -5312,17 +5312,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -5356,10 +5356,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5367,6 +5364,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -5467,17 +5467,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=iptables
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "iptables"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_iptables
class install_iptables {
package { 'iptables':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "iptables"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure iptables is installed
package:
name: iptables
@@ -5511,7 +5511,21 @@
[ref]
| To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 | Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra | Identifiers and References | Identifiers:
CCE-80180-3 References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, 3.3.9 | | |
|
Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-cis_workstation_l2.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -804,17 +804,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -22802,7 +22802,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.
| Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | Identifiers:
CCE-80415-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030830, 4.1.16, SV-204562r603261_rule | | |
|
Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -23473,7 +23473,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | Identifiers:
CCE-80414-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030820, 4.1.16, SV-204560r809822_rule | | |
|
Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules |
[ref]
@@ -25791,7 +25791,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Severity: | high |
Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords |
Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 rule |
[ref]
@@ -15068,7 +15068,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -15763,7 +15763,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-27219-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -16439,7 +16439,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-27216-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80206-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -3911,7 +3911,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-80449-2 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Reboot Activation
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -4011,7 +4011,18 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-27511-5 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-07-020230, SV-204455r603261_rule | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux 7 systems support an "interactive boot" option that can
@@ -4392,7 +4392,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
Restrict Root Logins
Group contains 1 rule |
[ref]
@@ -8155,7 +8155,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -8850,7 +8850,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-27219-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -9526,7 +9526,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-27216-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80206-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1389,7 +1389,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-80449-2 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Reboot Activation
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1489,7 +1489,18 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-27511-5 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-07-020230, SV-204455r603261_rule | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux 7 systems support an "interactive boot" option that can
@@ -1763,7 +1763,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | Remediation Kubernetes snippet ⇲---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/password-auth
+ overwrite: true
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/system-auth
+ overwrite: true
+
Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Strategy: | configure |
---|
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
SYSTEM_AUTH="/etc/pam.d/system-auth"
@@ -1788,7 +1807,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Strategy: | configure |
---|
- name: Check if system relies on authselect
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Strategy: | configure |
---|
- name: Check if system relies on authselect
ansible.builtin.stat:
path: /usr/bin/authselect
register: result_authselect_present
@@ -1945,25 +1964,6 @@
/usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel7-guide-ncp.html 2022-07-15 00:00:00.000000000 +0000
@@ -472,17 +472,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -9957,17 +9957,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=screen
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "screen"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_screen
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_screen
class install_screen {
package { 'screen':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "screen"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure screen is installed
package:
name: screen
@@ -10019,17 +10019,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -10063,17 +10063,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pcsc-lite
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pcsc-lite"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
class install_pcsc-lite {
package { 'pcsc-lite':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pcsc-lite"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pcsc-lite is installed
package:
name: pcsc-lite
@@ -10114,10 +10114,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["pcscd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
class enable_pcscd {
service {'pcscd':
@@ -10125,6 +10122,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["pcscd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service pcscd
block:
@@ -10462,7 +10462,18 @@
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted.
| Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80206-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -10583,7 +10583,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-80449-2 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80206-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -3902,7 +3902,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-80449-2 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Reboot Activation
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -4002,7 +4002,18 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-27511-5 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-07-020230, SV-204455r603261_rule | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux 7 systems support an "interactive boot" option that can
@@ -4383,7 +4383,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
System Accounting with auditd
Group contains 9 groups and 41 rules |
[ref]
@@ -16597,7 +16597,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -17292,7 +17292,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-27219-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -17968,7 +17968,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-27216-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80206-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -7060,7 +7060,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-80449-2 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
Restrict Root Logins
Group contains 5 rules |
[ref]
@@ -6169,7 +6169,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-27294-8 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.5 |
|
|
Rule
Ensure that System Accounts Are Locked
[ref] | Some accounts are not associated with a human user of the system, and exist to
@@ -28625,7 +28625,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | Identifiers:
CCE-80415-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030830, 4.1.16, SV-204562r603261_rule | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
Restrict Root Logins
Group contains 2 rules |
[ref]
@@ -3611,10 +3611,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -3622,6 +3619,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -3708,7 +3708,21 @@
install dccp /bin/true
|
Rationale: | Disabling DCCP protects
the system against exploitation of any flaws in its implementation. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled |
Identifiers and References | Identifiers:
CCE-82024-1 References:
- 11, 14, 3, 9, 5.10.1, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.4.6, CCI-001958, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000096-GPOS-00050, SRG-OS-000378-GPOS-00163, RHEL-07-020101, 3.4.1, SV-204450r603261_rule |
|
|
Rule
Disable SCTP Support
[ref] | The Stream Control Transmission Protocol (SCTP) is a
@@ -3769,7 +3769,21 @@
install sctp /bin/true | Rationale: | Disabling SCTP protects
the system against exploitation of any flaws in its implementation. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled | Identifiers and References | Identifiers:
CCE-82044-9 References:
- 11, 14, 3, 9, 5.10.1, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.4.6, CCI-000381, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000095-GPOS-00049, 3.4.2 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 1 rule |
[ref]
@@ -12437,7 +12437,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-27290-6 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -13132,7 +13132,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-27219-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -13808,7 +13808,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-27216-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Enable Smart Card Login
[ref] | To enable smart card authentication, consult the documentation at:
@@ -8931,7 +8931,18 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-27511-5 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-07-020230, SV-204455r603261_rule | | |
|
Rule
Require Authentication for Single User Mode
[ref] | Single-user mode is intended as a system recovery
@@ -9406,7 +9406,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
Restrict Root Logins
Group contains 1 rule |
[ref]
@@ -33236,7 +33236,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-80415-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030830, 4.1.16, SV-204562r603261_rule |
|
|
Rule
Enable Smart Card Login
[ref] | To enable smart card authentication, consult the documentation at:
@@ -8937,7 +8937,18 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-27511-5 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-07-020230, SV-204455r603261_rule | | |
|
Rule
Require Authentication for Single User Mode
[ref] | Single-user mode is intended as a system recovery
@@ -9412,7 +9412,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-27286-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-07-010290, SV-204424r809187_rule | | |
|
Group
Restrict Root Logins
Group contains 1 rule |
[ref]
@@ -33242,7 +33242,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-80415-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-07-030830, 4.1.16, SV-204562r603261_rule |
|
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-80840-2 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.6 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules |
[ref]
@@ -6602,7 +6602,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-80794-1 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7, 4.3 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -6852,17 +6852,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -802,17 +802,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1404,17 +1404,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -5577,7 +5577,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-80840-2 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.6 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules |
[ref]
@@ -6978,7 +6978,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-80794-1 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7, 4.3 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -7228,17 +7228,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -474,17 +474,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1076,17 +1076,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -5249,7 +5249,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-80840-2 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7, 5.6 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 2 rules |
[ref]
@@ -6218,7 +6218,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-80794-1 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7, 4.3 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -6468,17 +6468,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
@@ -246,17 +246,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4360,17 +4360,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4405,10 +4405,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4416,6 +4413,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -618,17 +618,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -26301,7 +26301,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-80711-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-08-030390, 4.1.15, SV-230446r627750_rule |
|
|
Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -26980,7 +26980,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | Identifiers:
CCE-80713-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-08-030360, 4.1.15, SV-230438r810464_rule | | |
|
Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules |
[ref]
@@ -28274,7 +28274,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-80745-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 |
|
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20adjtimex%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20adjtimex%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-adjtimex.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -28614,7 +28628,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
package_facts:
manager: auto
tags:
@@ -28931,20 +28945,6 @@
- medium_severity
- no_reboot_needed
- restrict_strategy
-
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
-apiVersion: machineconfiguration.openshift.io/v1
-kind: MachineConfig
-spec:
- config:
- ignition:
- version: 3.1.0
- storage:
- files:
- - contents:
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -538,17 +538,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5121,17 +5121,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5166,10 +5166,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5177,6 +5174,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -5327,17 +5327,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -5372,10 +5372,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5383,6 +5380,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -5469,7 +5469,21 @@
[ref]
|
To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 |
Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra |
Identifiers and References | Identifiers:
CCE-81006-9 References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, RHEL-08-040261, 3.2.9, SV-230541r818875_rule |
|
|
Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
+ [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
+To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
+ CCE-81009-3 References:
+ BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, RHEL-08-040280, 3.2.2, SV-230544r818887_rule | |
|
Rule
- Disable Accepting ICMP Redirects for All IPv6 Interfaces
- [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
- CCE-81009-3 References:
- BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, RHEL-08-040280, 3.2.2, SV-230544r818887_rule | Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Reboot: | true |
---|
Strategy: | disable |
---|
# Remediation is applicable only in certain platforms
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -127,17 +127,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -538,17 +538,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -5121,17 +5121,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -5166,10 +5166,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -5177,6 +5174,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -5327,17 +5327,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -5372,10 +5372,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -5383,6 +5380,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -5469,7 +5469,21 @@
[ref]
| To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 | Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra | Identifiers and References | Identifiers:
CCE-81006-9 References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, RHEL-08-040261, 3.2.9, SV-230541r818875_rule | | |
|
Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
+ [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
+To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
+ CCE-81009-3 References:
+ BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, RHEL-08-040280, 3.2.2, SV-230544r818887_rule | |
|
Rule
- Disable Accepting ICMP Redirects for All IPv6 Interfaces
- [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
- CCE-81009-3 References:
- BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227, RHEL-08-040280, 3.2.2, SV-230544r818887_rule | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | Identifiers:
CCE-80711-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-08-030390, 4.1.15, SV-230446r627750_rule | | |
|
Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -26980,7 +26980,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | Identifiers:
CCE-80713-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-08-030360, 4.1.15, SV-230438r810464_rule | | |
|
Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules |
[ref]
@@ -28274,7 +28274,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-80745-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 |
|
|
Severity: | high |
Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords |
Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 rule |
[ref]
@@ -18677,7 +18677,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-80745-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -19372,7 +19372,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-80746-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -20048,7 +20048,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-80747-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
@@ -138,17 +138,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -443,17 +443,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -1048,17 +1048,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1091,17 +1091,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-plugin-subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-plugin-subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-plugin-subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-plugin-subscription-manager
class install_dnf-plugin-subscription-manager {
package { 'dnf-plugin-subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-plugin-subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-plugin-subscription-manager is installed
package:
name: dnf-plugin-subscription-manager
@@ -1132,17 +1132,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -1169,17 +1169,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -1212,17 +1212,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -1251,17 +1251,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
class install_subscription-manager {
package { 'subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure subscription-manager is installed
package:
name: subscription-manager
@@ -1712,17 +1712,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
@@ -950,17 +950,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rear
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rear"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
class install_rear {
package { 'rear':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rear"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rear is installed
package:
name: rear
@@ -1566,7 +1566,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
| Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule | | |
|
Group
Restrict Root Logins
Group contains 1 rule |
[ref]
@@ -8297,7 +8297,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-80745-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -8992,7 +8992,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-80746-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -9668,7 +9668,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-80747-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80876-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-08-040180, SV-230532r627750_rule | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1524,7 +1524,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-80784-2 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-08-040172, SV-230531r627750_rule | | |
|
Rule
Disable Ctrl-Alt-Del Reboot Activation
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1626,7 +1626,18 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-80785-9 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-08-040170, SV-230529r627750_rule | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux 8 systems support an "interactive boot" option that can
@@ -1899,7 +1899,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule | | |
|
Group
Restrict Root Logins
Group contains 2 rules |
[ref]
@@ -12132,7 +12132,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-80745-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -12827,7 +12827,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-80746-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
@@ -129,17 +129,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -434,17 +434,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -1039,17 +1039,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1082,17 +1082,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-plugin-subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-plugin-subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-plugin-subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-plugin-subscription-manager
class install_dnf-plugin-subscription-manager {
package { 'dnf-plugin-subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-plugin-subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-plugin-subscription-manager is installed
package:
name: dnf-plugin-subscription-manager
@@ -1123,17 +1123,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -1160,17 +1160,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -1203,17 +1203,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -1242,17 +1242,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
class install_subscription-manager {
package { 'subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure subscription-manager is installed
package:
name: subscription-manager
@@ -1703,17 +1703,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
/usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel8-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -437,17 +437,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4672,17 +4672,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -4717,17 +4717,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pcsc-lite
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pcsc-lite"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
class install_pcsc-lite {
package { 'pcsc-lite':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pcsc-lite"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pcsc-lite is installed
package:
name: pcsc-lite
@@ -4768,10 +4768,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["pcscd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
class enable_pcscd {
service {'pcscd':
@@ -4779,6 +4776,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["pcscd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service pcscd
block:
@@ -5301,7 +5301,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
| Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule | | |
|
Group
System Accounting with auditd
Group contains 9 groups and 57 rules |
[ref]
@@ -29354,7 +29354,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-80711-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970, RHEL-08-030390, 4.1.15, SV-230446r627750_rule |
|
|
Severity: | high |
Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords |
Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule |
|
|
Group
Restrict Root Logins
Group contains 2 rules |
[ref]
@@ -3725,10 +3725,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -3736,6 +3733,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -3822,7 +3822,21 @@
install dccp /bin/true
|
Rationale: | Disabling DCCP protects
the system against exploitation of any flaws in its implementation. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_kernel_module_dccp_disabled |
Identifiers and References | Identifiers:
CCE-80833-7 References:
- 11, 14, 3, 9, 5.10.1, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.4.6, CCI-001958, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000096-GPOS-00050, SRG-OS-000378-GPOS-00163, 3.3.1 |
|
|
Rule
Disable SCTP Support
[ref] | The Stream Control Transmission Protocol (SCTP) is a
@@ -3882,7 +3882,21 @@
install sctp /bin/true | Rationale: | Disabling SCTP protects
the system against exploitation of any flaws in its implementation. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_kernel_module_sctp_disabled | Identifiers and References | Identifiers:
CCE-80834-5 References:
- 11, 14, 3, 9, 5.10.1, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.4.6, CCI-000381, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000095-GPOS-00049, RHEL-08-040023, 3.3.2, SV-230496r792917_rule | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-80841-0 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, RHEL-08-020331, SV-244540r743869_rule | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 1 rule |
[ref]
@@ -16275,7 +16275,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-80745-3 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -16970,7 +16970,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-80746-1 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -17646,7 +17646,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-80747-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.6 | | | Severity: | low | Rule ID: | xccdf_org.ssgproject.content_rule_no_tmux_in_shells | Identifiers and References | Identifiers:
CCE-82361-7 References:
- CCI-000056, CM-6, FMT_SMF_EXT.1, SRG-OS-000324-GPOS-00125, SRG-OS-000028-GPOS-00009, RHEL-08-020042, SV-230350r627750_rule | | |
|
Group
Hardware Tokens for Authentication
Group contains 2 rules |
[ref]
@@ -10375,17 +10375,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -10431,17 +10431,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -10458,7 +10458,18 @@
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80876-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-08-040180, SV-230532r627750_rule | | | Severity: | low | Rule ID: | xccdf_org.ssgproject.content_rule_no_tmux_in_shells | Identifiers and References | Identifiers:
CCE-82361-7 References:
- CCI-000056, CM-6, FMT_SMF_EXT.1, SRG-OS-000324-GPOS-00125, SRG-OS-000028-GPOS-00009, RHEL-08-020042, SV-230350r627750_rule | | |
|
Group
Hardware Tokens for Authentication
Group contains 2 rules |
[ref]
@@ -10340,17 +10340,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -10396,17 +10396,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -10423,7 +10423,18 @@
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-80876-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227, RHEL-08-040180, SV-230532r627750_rule | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins | Identifiers and References | Identifiers:
CCE-83625-4 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules |
[ref]
@@ -6090,7 +6090,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-83993-6 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -6339,17 +6339,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_high.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -713,17 +713,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -1056,17 +1056,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -5092,7 +5092,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-83625-4 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 6 rules |
[ref]
@@ -6420,7 +6420,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-83993-6 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -6669,17 +6669,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_intermediary.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -431,17 +431,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -774,17 +774,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4810,7 +4810,21 @@
to privileged (root) access via su / sudo. This is required for FISMA Low
and FISMA Moderate systems.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_no_direct_root_logins |
Identifiers and References | Identifiers:
CCE-83625-4 References:
- BP28(R19), 1, 12, 15, 16, 5, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.03, DSS06.10, 3.1.1, 3.1.6, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, A.18.1.4, A.7.1.1, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.2, A.9.4.3, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.2.3, CIP-004-6 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.2, CIP-007-3 R5.2, CIP-007-3 R5.3.1, CIP-007-3 R5.3.2, CIP-007-3 R5.3.3, IA-2, CM-6(a), PR.AC-1, PR.AC-6, PR.AC-7 |
|
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 2 rules |
[ref]
@@ -5713,7 +5713,21 @@
that they fill up the /var/log partition. Valuable logging information could be lost
if the /var/log partition becomes full. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_ensure_logrotate_activated |
Identifiers and References | Identifiers:
CCE-83993-6 References:
- BP28(R43), NT12(R18), 1, 14, 15, 16, 3, 5, 6, APO11.04, BAI03.05, DSS05.04, DSS05.07, MEA02.01, CCI-000366, 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 2.10, SR 2.11, SR 2.12, SR 2.8, SR 2.9, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, CM-6(a), PR.PT-1, Req-10.7 |
|
|
Group
Rsyslog Logs Sent To Remote Host
Group contains 3 rules |
[ref]
@@ -5962,17 +5962,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog-gnutls
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog-gnutls"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog-gnutls
class install_rsyslog-gnutls {
package { 'rsyslog-gnutls':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog-gnutls"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog-gnutls is installed
package:
name: rsyslog-gnutls
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-anssi_bp28_minimal.html 2022-07-15 00:00:00.000000000 +0000
@@ -240,17 +240,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4264,17 +4264,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4308,10 +4308,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4319,6 +4316,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis.html 2022-07-15 00:00:00.000000000 +0000
@@ -124,17 +124,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -611,17 +611,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -25806,7 +25806,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-83802-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 |
|
|
Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -26473,7 +26473,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | Identifiers:
CCE-90835-0 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
|
Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules |
[ref]
@@ -27749,7 +27749,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-83840-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b |
|
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20adjtimex%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20adjtimex%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-adjtimex.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -28089,7 +28103,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
package_facts:
manager: auto
tags:
@@ -28406,20 +28420,6 @@
- medium_severity
- no_reboot_needed
- restrict_strategy
-
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
-apiVersion: machineconfiguration.openshift.io/v1
-kind: MachineConfig
-spec:
- config:
- ignition:
- version: 3.1.0
- storage:
- files:
- - contents:
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_server_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -124,17 +124,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -531,17 +531,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4611,17 +4611,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4655,10 +4655,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4666,6 +4663,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -4815,17 +4815,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -4859,10 +4859,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -4870,6 +4867,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -4955,7 +4955,21 @@
[ref]
|
To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 |
Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra |
Identifiers and References | Identifiers:
CCE-84120-5 References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 |
|
|
Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
+ [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
+To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
+ CCE-84125-4 References:
+ BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | |
|
Rule
- Disable Accepting ICMP Redirects for All IPv6 Interfaces
- [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
- CCE-84125-4 References:
- BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | Remediation Shell script ⇲Complexity: | low |
---|
Disruption: | medium |
---|
Reboot: | true |
---|
Strategy: | disable |
---|
# Remediation is applicable only in certain platforms
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cis_workstation_l1.html 2022-07-15 00:00:00.000000000 +0000
@@ -124,17 +124,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -531,17 +531,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -4611,17 +4611,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rsyslog
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rsyslog"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rsyslog
class install_rsyslog {
package { 'rsyslog':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rsyslog"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rsyslog is installed
package:
name: rsyslog
@@ -4655,10 +4655,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["rsyslog"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_rsyslog
class enable_rsyslog {
service {'rsyslog':
@@ -4666,6 +4663,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["rsyslog"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service rsyslog
block:
@@ -4815,17 +4815,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=firewalld
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "firewalld"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_firewalld
class install_firewalld {
package { 'firewalld':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "firewalld"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure firewalld is installed
package:
name: firewalld
@@ -4859,10 +4859,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["firewalld"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_firewalld
class enable_firewalld {
service {'firewalld':
@@ -4870,6 +4867,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["firewalld"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service firewalld
block:
@@ -4955,7 +4955,21 @@
[ref]
| To set the runtime status of the net.ipv6.conf.all.accept_ra kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_ra=0
To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_ra = 0 | Rationale: | An illicit router advertisement message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_ra | Identifiers and References | Identifiers:
CCE-84120-5 References:
- 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | | |
|
Rule
+ Disable Accepting ICMP Redirects for All IPv6 Interfaces
+ [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
+To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
+ CCE-84125-4 References:
+ BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | |
|
Rule
- Disable Accepting ICMP Redirects for All IPv6 Interfaces
- [ref] | To set the runtime status of the net.ipv6.conf.all.accept_redirects kernel parameter, run the following command: $ sudo sysctl -w net.ipv6.conf.all.accept_redirects=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d : net.ipv6.conf.all.accept_redirects = 0 | Rationale: | An illicit ICMP redirect message could result in a man-in-the-middle attack. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_sysctl_net_ipv6_conf_all_accept_redirects | Identifiers and References | Identifiers:
- CCE-84125-4 References:
- BP28(R22), 11, 14, 3, 9, BAI10.01, BAI10.02, BAI10.03, BAI10.05, DSS05.02, DSS05.05, DSS06.06, 3.1.20, CCI-000366, CCI-001551, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.5.3, 4.3.3.5.4, 4.3.3.5.5, 4.3.3.5.6, 4.3.3.5.7, 4.3.3.5.8, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.1, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, 4.3.4.3.2, 4.3.4.3.3, SR 1.1, SR 1.10, SR 1.11, SR 1.12, SR 1.13, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.6, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 2.2, SR 2.3, SR 2.4, SR 2.5, SR 2.6, SR 2.7, SR 7.6, A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2, A.14.2.3, A.14.2.4, A.9.1.2, CM-7(a), CM-7(b), CM-6(a), CM-6(b), CM-6.1(iv), PR.IP-1, PR.PT-3, SRG-OS-000480-GPOS-00227 | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete | Identifiers and References | Identifiers:
CCE-83802-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
|
Rule
Ensure auditd Collects Information on Kernel Module Loading - init_module
[ref] | To capture kernel module loading events, use following line, setting ARCH to
@@ -26473,7 +26473,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_init | Identifiers and References | Identifiers:
CCE-90835-0 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 | | |
|
Group
Record Attempts to Alter Logon and Logout Events
Group contains 2 rules |
[ref]
@@ -27749,7 +27749,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-83840-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b |
|
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20adjtimex%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20adjtimex%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-adjtimex.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -28089,7 +28103,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
package_facts:
manager: auto
tags:
@@ -28406,20 +28420,6 @@
- medium_severity
- no_reboot_needed
- restrict_strategy
-
Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
-apiVersion: machineconfiguration.openshift.io/v1
-kind: MachineConfig
-spec:
- config:
- ignition:
- version: 3.1.0
- storage:
- files:
- - contents:
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-cui.html 2022-07-15 00:00:00.000000000 +0000
@@ -138,17 +138,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -346,17 +346,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -832,17 +832,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -879,17 +879,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -916,17 +916,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -959,17 +959,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -1004,17 +1004,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
class install_subscription-manager {
package { 'subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure subscription-manager is installed
package:
name: subscription-manager
@@ -1172,17 +1172,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4319,17 +4319,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-e8.html 2022-07-15 00:00:00.000000000 +0000
@@ -812,17 +812,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=rear
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "rear"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_rear
class install_rear {
package { 'rear':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "rear"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure rear is installed
package:
name: rear
@@ -1398,7 +1398,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
|
Severity: | high |
Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords |
Identifiers and References | Identifiers:
CCE-83611-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 |
|
|
Group
Restrict Root Logins
Group contains 1 rule |
[ref]
@@ -8093,7 +8093,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-83840-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -8788,7 +8788,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-83837-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -9464,7 +9464,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | Identifiers:
CCE-83836-7 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-90724-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1379,7 +1379,21 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_burstaction | Identifiers and References | Identifiers:
CCE-90308-8 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), CM-6(a), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Disable Ctrl-Alt-Del Reboot Activation
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -1443,16 +1443,7 @@
the case of mixed OS environment, this can create the risk of short-term
loss of availability of systems due to unintentional reboot. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_disable_ctrlaltdel_reboot | Identifiers and References | Identifiers:
CCE-86667-3 References:
- 12, 13, 14, 15, 16, 18, 3, 5, APO01.06, DSS05.04, DSS05.07, DSS06.02, 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.7.3, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.3, A.9.4.1, A.9.4.4, A.9.4.5, CIP-003-8 R5.1.1, CIP-003-8 R5.3, CIP-004-6 R2.3, CIP-007-3 R2.1, CIP-007-3 R2.2, CIP-007-3 R2.3, CIP-007-3 R5.1, CIP-007-3 R5.1.1, CIP-007-3 R5.1.2, CM-6(a), AC-6(1), PR.AC-4, PR.DS-5, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | |
|
Rule
Verify that Interactive Boot is Disabled
[ref] | Red Hat Enterprise Linux 9 systems support an "interactive boot" option that can
@@ -1696,7 +1696,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-83611-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-83611-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
|
Group
Restrict Root Logins
Group contains 2 rules |
[ref]
@@ -11682,7 +11682,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | Identifiers:
CCE-83840-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -12377,7 +12377,21 @@
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | Identifiers:
CCE-83837-5 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-ospp.html 2022-07-15 00:00:00.000000000 +0000
@@ -128,17 +128,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -336,17 +336,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=crypto-policies
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "crypto-policies"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_crypto-policies
class install_crypto-policies {
package { 'crypto-policies':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "crypto-policies"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure crypto-policies is installed
package:
name: crypto-policies
@@ -822,17 +822,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=sudo
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "sudo"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_sudo
class install_sudo {
package { 'sudo':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "sudo"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure sudo is installed
package:
name: sudo
@@ -869,17 +869,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=gnutls-utils
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_gnutls-utils
class install_gnutls-utils {
package { 'gnutls-utils':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "gnutls-utils"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -906,17 +906,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openscap-scanner
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openscap-scanner"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openscap-scanner
class install_openscap-scanner {
package { 'openscap-scanner':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openscap-scanner"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure openscap-scanner is installed
package:
name: openscap-scanner
@@ -949,17 +949,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=scap-security-guide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "scap-security-guide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_scap-security-guide
class install_scap-security-guide {
package { 'scap-security-guide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "scap-security-guide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure scap-security-guide is installed
package:
name: scap-security-guide
@@ -994,17 +994,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=subscription-manager
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "subscription-manager"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_subscription-manager
class install_subscription-manager {
package { 'subscription-manager':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "subscription-manager"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure subscription-manager is installed
package:
name: subscription-manager
@@ -1162,17 +1162,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=dnf-automatic
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "dnf-automatic"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_dnf-automatic
class install_dnf-automatic {
package { 'dnf-automatic':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "dnf-automatic"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure dnf-automatic is installed
package:
name: dnf-automatic
@@ -4309,17 +4309,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=tmux
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "tmux"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_tmux
class install_tmux {
package { 'tmux':
ensure => 'installed',
/usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-rhel9-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -302,17 +302,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4476,17 +4476,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -4520,17 +4520,17 @@
fi
Remediation Anaconda snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=pcsc-lite
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "pcsc-lite"
-version = "*"
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_pcsc-lite
class install_pcsc-lite {
package { 'pcsc-lite':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "pcsc-lite"
+version = "*"
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure pcsc-lite is installed
package:
name: pcsc-lite
@@ -4571,10 +4571,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-enabled = ["pcscd"]
-
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
+
Remediation Puppet snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include enable_pcscd
class enable_pcscd {
service {'pcscd':
@@ -4582,6 +4579,9 @@
ensure => 'running',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[customizations.services]
+enabled = ["pcscd"]
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Enable service pcscd
block:
@@ -4976,7 +4976,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
| Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | Identifiers:
CCE-83611-4 References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
|
Group
System Accounting with auditd
Group contains 9 groups and 57 rules |
[ref]
@@ -28911,7 +28911,21 @@
the kernel and potentially introduce malicious code into kernel space. It is important
to have an audit trail of modules that have been introduced into the kernel. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_kernel_module_loading_delete |
Identifiers and References | Identifiers:
CCE-83802-9 References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-000130, CCI-000169, CCI-000172, CCI-002884, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1.1.c, Req-10.2.7, SRG-OS-000037-GPOS-00015, SRG-OS-000042-GPOS-00020, SRG-OS-000062-GPOS-00031, SRG-OS-000392-GPOS-00172, SRG-OS-000462-GPOS-00206, SRG-OS-000471-GPOS-00215, SRG-OS-000471-GPOS-00216, SRG-OS-000477-GPOS-00222, SRG-OS-000477-VMM-001970 |
|
|
Severity: | low |
Rule ID: | xccdf_org.ssgproject.content_rule_no_tmux_in_shells |
Identifiers and References | Identifiers:
CCE-89538-3 References:
- CCI-000056, CM-6, FMT_SMF_EXT.1, SRG-OS-000324-GPOS-00125, SRG-OS-000028-GPOS-00009 |
|
|
Group
Hardware Tokens for Authentication
Group contains 2 rules |
[ref]
@@ -9184,17 +9184,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -9239,17 +9239,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -9266,7 +9266,18 @@
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-90724-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | | Severity: | low | Rule ID: | xccdf_org.ssgproject.content_rule_no_tmux_in_shells | Identifiers and References | Identifiers:
CCE-89538-3 References:
- CCI-000056, CM-6, FMT_SMF_EXT.1, SRG-OS-000324-GPOS-00125, SRG-OS-000028-GPOS-00009 | | |
|
Group
Hardware Tokens for Authentication
Group contains 2 rules |
[ref]
@@ -9190,17 +9190,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=opensc
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "opensc"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_opensc
class install_opensc {
package { 'opensc':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "opensc"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure opensc is installed
package:
name: opensc
@@ -9245,17 +9245,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=openssl-pkcs11
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "openssl-pkcs11"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_openssl-pkcs11
class install_openssl-pkcs11 {
package { 'openssl-pkcs11':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "openssl-pkcs11"
+version = "*"
|
Rule
Disable debug-shell SystemD Service
[ref] | SystemD's debug-shell service is intended to
@@ -9272,7 +9272,18 @@
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled | Identifiers and References | Identifiers:
CCE-90724-6 References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
|
Group
System Accounting with auditd
Group contains 9 groups and 57 rules |
[ref]
@@ -37010,17 +37010,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=audispd-plugins
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "audispd-plugins"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audispd-plugins
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_audispd-plugins
class install_audispd-plugins {
package { 'audispd-plugins':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "audispd-plugins"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure audispd-plugins is installed
package:
name: audispd-plugins
@@ -37048,7 +37048,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions.
|
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 |
|
|
Rationale: | This prevents attackers with physical access from trivially bypassing security
on the machine through valid troubleshooting configurations and gaining root
access when the system is rebooted. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_debug-shell_disabled |
Identifiers and References | References:
- 3.4.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), CM-6, FIA_UAU.1, SRG-OS-000324-GPOS-00125, SRG-OS-000480-GPOS-00227 |
|
|
Rule
Disable Ctrl-Alt-Del Burst Action
[ref] | By default, SystemD will reboot the system if the Ctrl-Alt-Del
@@ -7268,7 +7268,26 @@
a container anyway. | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227 | | |
|
Group
Restrict Root Logins
Group contains 5 rules |
[ref]
@@ -41813,7 +41813,18 @@
Additionally, a properly configured audit subsystem ensures that actions of
individual system users can be uniquely traced to those users so they
can be held accountable for their actions. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_service_auditd_enabled |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.3.1, 3.3.2, 3.3.6, CCI-000126, CCI-000130, CCI-000131, CCI-000132, CCI-000133, CCI-000134, CCI-000135, CCI-000154, CCI-000158, CCI-000366, CCI-001464, CCI-001487, CCI-001814, CCI-001876, CCI-002884, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(5)(ii)(C), 164.310(a)(2)(iv), 164.310(d)(2)(iii), 164.312(b), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, CIP-004-6 R3.3, CIP-007-3 R6.5, AC-2(g), AU-3, AU-10, AU-2(d), AU-12(c), AU-14(1), AC-6(9), CM-6(a), SI-4(23), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, FAU_GEN.1, Req-10.1, SRG-OS-000062-GPOS-00031, SRG-OS-000037-GPOS-00015, SRG-OS-000038-GPOS-00016, SRG-OS-000039-GPOS-00017, SRG-OS-000040-GPOS-00018, SRG-OS-000041-GPOS-00019, SRG-OS-000042-GPOS-00021, SRG-OS-000051-GPOS-00024, SRG-OS-000054-GPOS-00025, SRG-OS-000122-GPOS-00063, SRG-OS-000254-GPOS-00095, SRG-OS-000255-GPOS-00096, SRG-OS-000337-GPOS-00129, SRG-OS-000348-GPOS-00136, SRG-OS-000349-GPOS-00137, SRG-OS-000350-GPOS-00138, SRG-OS-000351-GPOS-00139, SRG-OS-000352-GPOS-00140, SRG-OS-000353-GPOS-00141, SRG-OS-000354-GPOS-00142, SRG-OS-000358-GPOS-00145, SRG-OS-000365-GPOS-00152, SRG-OS-000392-GPOS-00172, SRG-OS-000475-GPOS-00220, SRG-OS-000037-VMM-000150, SRG-OS-000063-VMM-000310, SRG-OS-000038-VMM-000160, SRG-OS-000039-VMM-000170, SRG-OS-000040-VMM-000180, SRG-OS-000041-VMM-000190 |
|
|
Rule
Enable Auditing for Processes Which Start Prior to the Audit Daemon
[ref] | To ensure all processes can be audited, even those which start
@@ -42095,10 +42095,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
- Remediation OSBuild Blueprint snippet ⇲
-[customizations.services]
-disabled = ["bluetooth"]
/usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/guides/ssg-sl7-guide-pci-dss.html 2022-07-15 00:00:00.000000000 +0000
@@ -443,17 +443,17 @@
fi
Remediation Anaconda snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
package --add=aide
-
Remediation OSBuild Blueprint snippet ⇲
-[[packages]]
-name = "aide"
-version = "*"
-
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
+
Remediation Puppet snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
include install_aide
class install_aide {
package { 'aide':
ensure => 'installed',
}
}
+
Remediation OSBuild Blueprint snippet ⇲
+[[packages]]
+name = "aide"
+version = "*"
Remediation Ansible snippet ⇲
Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | enable |
---|
- name: Ensure aide is installed
package:
name: aide
@@ -4542,7 +4542,26 @@
a container anyway.
| Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, SV-204424r809187_rule | | |
|
Group
System Accounting with auditd
Group contains 9 groups and 41 rules |
[ref]
@@ -16382,7 +16382,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -17072,7 +17072,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -17743,7 +17743,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | | Rationale: | If an account has an empty password, anyone could log in and
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments. | Severity: | high | Rule ID: | xccdf_org.ssgproject.content_rule_no_empty_passwords | Identifiers and References | References:
- 1, 12, 13, 14, 15, 16, 18, 3, 5, 5.5.2, APO01.06, DSS05.04, DSS05.05, DSS05.07, DSS05.10, DSS06.02, DSS06.03, DSS06.10, 3.1.1, 3.1.5, CCI-000366, 164.308(a)(1)(ii)(B), 164.308(a)(7)(i), 164.308(a)(7)(ii)(A), 164.310(a)(1), 164.310(a)(2)(i), 164.310(a)(2)(ii), 164.310(a)(2)(iii), 164.310(b), 164.310(c), 164.310(d)(1), 164.310(d)(2)(iii), 4.3.3.2.2, 4.3.3.5.1, 4.3.3.5.2, 4.3.3.6.1, 4.3.3.6.2, 4.3.3.6.3, 4.3.3.6.4, 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7, 4.3.3.6.8, 4.3.3.6.9, 4.3.3.7.2, 4.3.3.7.3, 4.3.3.7.4, SR 1.1, SR 1.10, SR 1.2, SR 1.3, SR 1.4, SR 1.5, SR 1.7, SR 1.8, SR 1.9, SR 2.1, SR 5.2, A.10.1.1, A.11.1.4, A.11.1.5, A.11.2.1, A.13.1.1, A.13.1.3, A.13.2.1, A.13.2.3, A.13.2.4, A.14.1.2, A.14.1.3, A.18.1.4, A.6.1.2, A.7.1.1, A.7.1.2, A.7.3.1, A.8.2.2, A.8.2.3, A.9.1.1, A.9.1.2, A.9.2.1, A.9.2.2, A.9.2.3, A.9.2.4, A.9.2.6, A.9.3.1, A.9.4.1, A.9.4.2, A.9.4.3, A.9.4.4, A.9.4.5, IA-5(1)(a), IA-5(c), CM-6(a), PR.AC-1, PR.AC-4, PR.AC-6, PR.AC-7, PR.DS-5, FIA_UAU.1, Req-8.2.3, SRG-OS-000480-GPOS-00227, SV-204424r809187_rule | | |
|
Group
Secure Session Configuration Files for Login Accounts
Group contains 1 group and 1 rule |
[ref]
@@ -12332,7 +12332,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. |
Severity: | medium |
Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_adjtimex |
Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 |
|
|
Rule
Record Attempts to Alter Time Through clock_settime
[ref] | If the auditd daemon is configured to use the
@@ -13022,7 +13022,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_clock_settime | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | |
|
Rule
Record attempts to alter time through settimeofday
[ref] | If the auditd daemon is configured to use the
@@ -13693,7 +13693,21 @@
nefarious activities in log files, as well as to confuse network services that
are highly dependent upon an accurate system time (such as sshd). All changes
to the system time should be audited. | Severity: | medium | Rule ID: | xccdf_org.ssgproject.content_rule_audit_rules_time_settimeofday | Identifiers and References | References:
- 1, 11, 12, 13, 14, 15, 16, 19, 2, 3, 4, 5, 6, 7, 8, 9, 5.4.1.1, APO10.01, APO10.03, APO10.04, APO10.05, APO11.04, APO12.06, APO13.01, BAI03.05, BAI08.02, DSS01.03, DSS01.04, DSS02.02, DSS02.04, DSS02.07, DSS03.01, DSS03.05, DSS05.02, DSS05.03, DSS05.04, DSS05.05, DSS05.07, MEA01.01, MEA01.02, MEA01.03, MEA01.04, MEA01.05, MEA02.01, 3.1.7, CCI-001487, CCI-000169, 164.308(a)(1)(ii)(D), 164.308(a)(3)(ii)(A), 164.308(a)(5)(ii)(C), 164.312(a)(2)(i), 164.312(b), 164.312(d), 164.312(e), 4.2.3.10, 4.3.2.6.7, 4.3.3.3.9, 4.3.3.5.8, 4.3.3.6.6, 4.3.4.4.7, 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8, 4.4.2.1, 4.4.2.2, 4.4.2.4, SR 1.13, SR 2.10, SR 2.11, SR 2.12, SR 2.6, SR 2.8, SR 2.9, SR 3.1, SR 3.5, SR 3.8, SR 4.1, SR 4.3, SR 5.1, SR 5.2, SR 5.3, SR 6.1, SR 6.2, SR 7.1, SR 7.6, A.11.2.6, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4, A.12.7.1, A.13.1.1, A.13.2.1, A.14.1.3, A.14.2.7, A.15.2.1, A.15.2.2, A.16.1.4, A.16.1.5, A.16.1.7, A.6.2.1, A.6.2.2, AU-2(d), AU-12(c), AC-6(9), CM-6(a), DE.AE-3, DE.AE-5, DE.CM-1, DE.CM-3, DE.CM-7, ID.SC-4, PR.AC-3, PR.PT-1, PR.PT-4, RS.AN-1, RS.AN-4, Req-10.4.2.b, 4.1.3 | | Remediation Kubernetes snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Reboot: | true |
---|
Strategy: | restrict |
---|
---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,{{ -a%20always%2Cexit%20-F%20arch%3Db64%20-S%20settimeofday%20-k%20audit_time_rules%0A-a%20always%2Cexit%20-F%20arch%3Db32%20-S%20settimeofday%20-k%20audit_time_rules%0A }}
+ mode: 0600
+ path: /etc/audit/rules.d/75-syscall-settimeofday.rules
+ overwrite: true
+
Remediation Shell script ⇲# Remediation is applicable only in certain platforms
if rpm --quiet -q audit; then
# Retrieve hardware architecture of the underlying system
@@ -14033,7 +14047,7 @@
else
>&2 echo 'Remediation is not applicable, nothing was done'
fi
-
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
+
Remediation Ansible snippet ⇲Complexity: | low |
---|
Disruption: | low |
---|
Strategy: | restrict |
---|
- name: Gather the package facts
/usr/share/doc/scap-security-guide/tables/table-ol7-anssirefs.html differs (HTML document, UTF-8 Unicode text)
--- old//usr/share/doc/scap-security-guide/tables/table-ol7-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol7-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,35 +42,73 @@
Rationale |
- BP28(R1) NT007(R03) |
- Uninstall the telnet server |
+ BP28(R1) |
+ Uninstall telnet-server Package |
-The telnet daemon should be uninstalled.
+The telnet-server package can be removed with the following command:
+
+$ sudo yum erase telnet-server
|
-telnet allows clear text communications, and does not protect
-any data transmission between client and server. Any confidential data
-can be listened and no integrity checking is made.'
+It is detrimental for operating systems to provide, or install by default,
+functionality exceeding requirements or mission objectives. These
+unnecessary capabilities are often overlooked and therefore may remain
+unsecure. They increase the risk to the platform by providing additional
+attack vectors.
+
+The telnet service provides an unencrypted remote access service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session. If a privileged user were to login using this service, the
+privileged user password could be compromised.
+
+Removing the telnet-server package decreases the risk of the
+telnet service's accidental (or intentional) activation.
|
BP28(R1) |
- Uninstall rsh Package |
+ Uninstall ypserv Package |
-
-The rsh package contains the client commands
-
-for the rsh services
+The ypserv package can be removed with the following command:
+
+$ sudo yum erase ypserv
|
-These legacy clients contain numerous security exposures and have
-been replaced with the more secure SSH package. Even if the server is removed,
-it is best to ensure the clients are also removed to prevent users from
-inadvertently attempting to use these commands and therefore exposing
-
-their credentials. Note that removing the rsh package removes
+The NIS service provides an unencrypted authentication service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session.
-the clients for rsh,rcp, and rlogin.
+Removing the ypserv package decreases the risk of the accidental
+(or intentional) activation of NIS or NIS+ services.
+ |
+
+
+ BP28(R1) |
+ Uninstall rsh-server Package |
+
+The rsh-server package can be removed with the following command:
+
+$ sudo yum erase rsh-server
+ |
+
+The rsh-server service provides unencrypted remote access service which does not
+provide for the confidentiality and integrity of user passwords or the remote session and has very weak
+authentication. If a privileged user were to login using this service, the privileged user password
+could be compromised. The rsh-server package provides several obsolete and insecure
+network services. Removing it decreases the risk of those services' accidental (or intentional)
+activation.
+ |
+
+
+ BP28(R1) NT007(R03) |
+ Uninstall the telnet server |
+
+The telnet daemon should be uninstalled.
+ |
+
+telnet allows clear text communications, and does not protect
+any data transmission between client and server. Any confidential data
+can be listened and no integrity checking is made.'
|
@@ -106,47 +144,6 @@
BP28(R1) |
- Uninstall telnet-server Package |
-
-The telnet-server package can be removed with the following command:
-
-$ sudo yum erase telnet-server
- |
-
-It is detrimental for operating systems to provide, or install by default,
-functionality exceeding requirements or mission objectives. These
-unnecessary capabilities are often overlooked and therefore may remain
-unsecure. They increase the risk to the platform by providing additional
-attack vectors.
-
-The telnet service provides an unencrypted remote access service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session. If a privileged user were to login using this service, the
-privileged user password could be compromised.
-
-Removing the telnet-server package decreases the risk of the
-telnet service's accidental (or intentional) activation.
- |
-
-
- BP28(R1) |
- Uninstall ypserv Package |
-
-The ypserv package can be removed with the following command:
-
-$ sudo yum erase ypserv
- |
-
-The NIS service provides an unencrypted authentication service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session.
-
-Removing the ypserv package decreases the risk of the accidental
-(or intentional) activation of NIS or NIS+ services.
- |
-
-
- BP28(R1) |
Uninstall Sendmail Package |
Sendmail is not the default mail transfer agent and is
@@ -163,30 +160,38 @@
|
BP28(R1) |
- Uninstall talk-server Package |
+ Uninstall tftp-server Package |
-The talk-server package can be removed with the following command: $ sudo yum erase talk-server
+The tftp-server package can be removed with the following command: $ sudo yum erase tftp-server
|
-The talk software presents a security risk as it uses unencrypted protocols
-for communications. Removing the talk-server package decreases the
-risk of the accidental (or intentional) activation of talk services.
+Removing the tftp-server package decreases the risk of the accidental
+(or intentional) activation of tftp services.
+
+If TFTP is required for operational support (such as transmission of router
+configurations), its use must be documented with the Information Systems
+Securty Manager (ISSM), restricted to only authorized personnel, and have
+access control rules established.
|
BP28(R1) |
- Uninstall DHCP Server Package |
+ Uninstall rsh Package |
-If the system does not need to act as a DHCP server,
-the dhcp package can be uninstalled.
-The dhcp package can be removed with the following command:
-
-$ sudo yum erase dhcp
+The rsh package contains the client commands
+
+for the rsh services
|
-Removing the DHCP server ensures that it cannot be easily or
-accidentally reactivated and disrupt network operation.
+These legacy clients contain numerous security exposures and have
+been replaced with the more secure SSH package. Even if the server is removed,
+it is best to ensure the clients are also removed to prevent users from
+inadvertently attempting to use these commands and therefore exposing
+
+their credentials. Note that removing the rsh package removes
+
+the clients for rsh,rcp, and rlogin.
|
@@ -204,18 +209,18 @@
BP28(R1) |
- Uninstall tftp-server Package |
+ Uninstall DHCP Server Package |
/usr/share/doc/scap-security-guide/tables/table-ol7-cuirefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-ol7-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol7-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,15 @@
3.1.1 3.4.5 |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -59,6 +60,27 @@
|
+ 3.1.1 3.1.5 |
+ Verify Only Root Has UID 0 |
+
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
+ |
+
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
+ |
+
+
3.1.1 |
Disable GDM Guest Login |
@@ -76,6 +98,31 @@
|
+ 3.1.1 3.1.5 |
+ Disable SSH Access via Empty Passwords |
+
+Disallow SSH login with empty passwords.
+The default SSH configuration disables logins with empty passwords. The appropriate
+configuration is used if no value is set for PermitEmptyPasswords.
+
+To explicitly disallow SSH login from accounts with empty passwords,
+add or correct the following line in
+
+
+/etc/ssh/sshd_config:
+
+
+PermitEmptyPasswords no
+Any accounts with empty passwords should be disabled immediately, and PAM configuration
+should prevent users from being able to assign themselves empty passwords.
+ |
+
+Configuring this setting for the SSH daemon provides additional assurance
+that remote login via SSH will require a password, even in the event of
+misconfiguration elsewhere.
+ |
+
+
3.1.1 3.1.6 |
Direct root Logins Not Allowed |
@@ -103,17 +150,21 @@
|
3.1.1 3.1.5 |
- Restrict Serial Port Root Logins |
+ Prevent Login to Accounts With Empty Password |
-To restrict root logins on serial ports,
-ensure lines of this form do not appear in /etc/securetty:
-ttyS0
-ttyS1
+If an account is configured for password authentication
+but does not have an assigned password, it may be possible to log
+into the account without authentication. Remove any instances of the
+nullok in
+
+/etc/pam.d/system-auth
+
+to prevent logins with empty passwords.
|
-Preventing direct root login to serial port interfaces
-helps ensure accountability for actions taken on the systems
-using the root account.
+If an account has an empty password, anyone could log in and
+run commands with the privileges of that account. Accounts with
+empty passwords should never be used in operational environments.
|
@@ -134,41 +185,20 @@
- 3.1.1 3.1.5 |
- Restrict Virtual Console Root Logins |
-
-To restrict root logins through the (deprecated) virtual console devices,
-ensure lines of this form do not appear in /etc/securetty:
-vc/1
-vc/2
-vc/3
-vc/4
- |
-
-Preventing direct root login to virtual console devices
-helps ensure accountability for actions taken on the system
-using the root account.
- |
-
-
- 3.1.1 3.1.5 |
- Verify Only Root Has UID 0 |
+ 3.1.1 3.4.5 |
+ Require Authentication for Emergency Systemd Target |
-If any account other than root has a UID of 0, this misconfiguration should
-be investigated and the accounts other than root should be removed or have
-their UID changed.
-
-If the account is associated with system commands or applications the UID
-should be changed to one greater than "0" but less than "1000."
-Otherwise assign a UID greater than "1000" that has not already been
-assigned.
+Emergency mode is intended as a system recovery
+method, providing a single user root access to the system
+during a failed boot sequence.
+
+By default, Emergency mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/emergency.service.
|
-An account has root authority if it has a UID of 0. Multiple accounts
-with a UID of 0 afford more opportunity for potential intruders to
-guess a password for a privileged account. Proper configuration of
-sudo is recommended to afford multiple system administrators
-access to root privileges in an accountable manner.
+This prevents attackers with physical access from trivially bypassing security
+on the machine and gaining root access. Such accesses are further prevented
+by configuring the bootloader password.
|
@@ -193,65 +223,64 @@
- 3.1.1 3.4.5 |
- Require Authentication for Single User Mode |
+ 3.1.1 3.1.5 |
+ Restrict Virtual Console Root Logins |
-Single-user mode is intended as a system recovery
-method, providing a single user root access to the system by
-providing a boot option at startup. By default, no authentication
-is performed if single-user mode is selected.
-
-By default, single-user mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/rescue.service.
+To restrict root logins through the (deprecated) virtual console devices,
+ensure lines of this form do not appear in /etc/securetty:
+vc/1
+vc/2
+vc/3
+vc/4
|
-This prevents attackers with physical access from trivially bypassing security
-on the machine and gaining root access. Such accesses are further prevented
-by configuring the bootloader password.
+Preventing direct root login to virtual console devices
+helps ensure accountability for actions taken on the system
+using the root account.
|
/usr/share/doc/scap-security-guide/tables/table-ol7-nistrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-ol7-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol7-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,38 +42,16 @@
Rationale |
- AU-2(d) AU-12(c) CM-6(a) |
- Ensure auditd Collects File Deletion Events by User - rename |
-
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
- |
-
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
- |
-
-
IA-2 AC-3 CM-6(a) |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -82,142 +60,110 @@
|
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Access Events to Audit Log Directory |
+ IA-2 AC-6(5) IA-4(b) |
+ Verify Only Root Has UID 0 |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
|
- AU-2(d) AU-12(c) CM-6(a) |
- Record Events that Modify the System's Mandatory Access Controls |
+ AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
AU-2(d) AU-12(c) CM-6(a) |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
-accesses for all users and root. If the auditd daemon is configured
+At a minimum, the audit system should collect file permission
+changes for all users and root. If the auditd daemon is configured
to use the augenrules program to read audit rules during daemon
-startup (the default), add the following lines to a file with suffix
+startup (the default), add the following line to a file with suffix
.rules in the directory /etc/audit/rules.d:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
+utility to read audit rules during daemon startup, add the following line to
/etc/audit/audit.rules file:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
- |
-
-Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
-these events could serve as evidence of potential system compromise.
- |
-
-
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Logon and Logout Events - lastlog |
-
-The audit system already collects login information for all users
-and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following lines to a file with suffix .rules in the
-directory /etc/audit/rules.d in order to watch for attempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
-/etc/audit/audit.rules file in order to watch for unattempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
|
-Manual editing of these files may indicate nefarious activity, such
-as an attacker attempting to remove evidence of an intrusion.
+The changing of file permissions could indicate that a user is attempting to
+gain access to information that would otherwise be disallowed. Auditing DAC modifications
+can facilitate the identification of patterns of abuse among both authorized and
+unauthorized users.
|
AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Time Through clock_settime |
+ Record Access Events to Audit Log Directory |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
/usr/share/doc/scap-security-guide/tables/table-ol7-ospprefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-ol7-ospprefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol7-ospprefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -53,6 +53,28 @@
|
FAU_GEN.1 |
+ Enable auditd Service |
+
+The auditd service is an essential userspace component of
+the Linux Auditing System, as it is responsible for writing audit records to
+disk.
+
+The auditd service can be enabled with the following command:
+$ sudo systemctl enable auditd.service
+ |
+
+Without establishing what type of events occurred, it would be difficult
+to establish, correlate, and investigate the events leading up to an outage or attack.
+Ensuring the auditd service is active ensures audit records
+generated by the kernel are appropriately recorded.
+
+Additionally, a properly configured audit subsystem ensures that actions of
+individual system users can be uniquely traced to those users so they
+can be held accountable for their actions.
+ |
+
+
+ FAU_GEN.1 |
Set number of records to cause an explicit flush to audit logs |
To configure Audit daemon to issue an explicit flush to disk command
@@ -88,28 +110,6 @@
|
FAU_GEN.1 |
- Enable auditd Service |
-
-The auditd service is an essential userspace component of
-the Linux Auditing System, as it is responsible for writing audit records to
-disk.
-
-The auditd service can be enabled with the following command:
-$ sudo systemctl enable auditd.service
- |
-
-Without establishing what type of events occurred, it would be difficult
-to establish, correlate, and investigate the events leading up to an outage or attack.
-Ensuring the auditd service is active ensures audit records
-generated by the kernel are appropriately recorded.
-
-Additionally, a properly configured audit subsystem ensures that actions of
-individual system users can be uniquely traced to those users so they
-can be held accountable for their actions.
- |
-
-
- FAU_GEN.1 |
Include Local Events in Audit Logs |
To configure Audit daemon to include local events in Audit logs, set
@@ -123,190 +123,127 @@
|
FAU_GEN.1.1.c |
- Ensure auditd Collects File Deletion Events by User - rename |
-
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
- |
-
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
- |
-
-
- FAU_GEN.1.1.c |
- Record Access Events to Audit Log Directory |
+ Record Events that Modify User/Group Information via open syscall - /etc/gshadow |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
+The audit system should collect write events to /etc/gshadow file for all users and root.
+If the auditd daemon is configured
+to use the augenrules program to read audit rules during daemon
+startup (the default), add the following lines to a file with suffix
+.rules in the directory /etc/audit/rules.d:
+-a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/gshadow -F auid>=1000 -F auid!=unset -F key=user-modify
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+utility to read audit rules during daemon startup, add the following lines to
+/etc/audit/audit.rules file:
+-a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/gshadow -F auid>=1000 -F auid!=unset -F key=user-modify
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/gshadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+Creation of users through direct edition of /etc/gshadow could be an indicator of malicious activity on a system.
+Auditing these events could serve as evidence of potential system compromise.
|
FAU_GEN.1.1.c |
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd |
+ Encrypt Audit Records Sent With audispd Plugin |
-At a minimum, the audit system should collect the execution of
-privileged commands for all users and root. If the auditd daemon is
-configured to use the augenrules program to read audit rules during
-daemon startup (the default), add a line of the following form to a file with
-suffix .rules in the directory /etc/audit/rules.d:
--a always,exit -F path=/usr/sbin/unix_chkpwd -F auid>=1000 -F auid!=unset -F key=privileged
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add a line of the following
-form to /etc/audit/audit.rules:
--a always,exit -F path=/usr/sbin/unix_chkpwd -F auid>=1000 -F auid!=unset -F key=privileged
+Configure the operating system to encrypt the transfer of off-loaded audit
+records onto a different system or media from the system being audited.
+
+Uncomment the enable_krb5 option in /etc/audisp/audisp-remote.conf ,
+and set it with the following line:
+enable_krb5 = yes
|
-Misuse of privileged functions, either intentionally or unintentionally by
-authorized users, or by unauthorized external entities that have compromised system accounts,
-is a serious and ongoing concern and can have significant adverse impacts on organizations.
-Auditing the use of privileged functions is one way to detect such misuse and identify
-the risk from insider and advanced persistent threats.
-
-Privileged programs are subject to escalation-of-privilege attacks,
-which attempt to subvert their normal role of providing some necessary but
-limited capability. As such, motivation exists to monitor these programs for
-unusual activity.
+Information stored in one location is vulnerable to accidental or incidental deletion
+or alteration. Off-loading is a common process in information systems with limited
+audit storage capacity.
|
FAU_GEN.1.1.c |
- Record Events that Modify the System's Mandatory Access Controls |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
FAU_GEN.1.1.c |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
/usr/share/doc/scap-security-guide/tables/table-ol7-pcidssrefs.html differs (HTML document, ASCII text)
--- old//usr/share/doc/scap-security-guide/tables/table-ol7-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol7-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -76,6 +76,29 @@
|
Req-6.2 |
+ Ensure Software Patches Installed |
+
+
+If the system is joined to the ULN
+or a yum server, run the following command to install updates:
+$ sudo yum update
+If the system is not configured to use one of these sources, updates (in the form of RPM packages)
+can be manually downloaded from the ULN and installed using rpm.
+
+
+NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
+dictates.
+ |
+
+Installing software updates is a fundamental mitigation against
+the exploitation of publicly-known vulnerabilities. If the most
+recent security patches and updates are not installed, unauthorized
+users may take advantage of weaknesses in the unpatched software. The
+lack of prompt attention to patching could result in a system compromise.
+ |
+
+
+ Req-6.2 |
Ensure gpgcheck Enabled In Main yum Configuration |
The gpgcheck option controls whether
@@ -104,29 +127,6 @@
|
Req-6.2 |
- Ensure Software Patches Installed |
-
-
-If the system is joined to the ULN
-or a yum server, run the following command to install updates:
-$ sudo yum update
-If the system is not configured to use one of these sources, updates (in the form of RPM packages)
-can be manually downloaded from the ULN and installed using rpm.
-
-
-NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
-dictates.
- |
-
-Installing software updates is a fundamental mitigation against
-the exploitation of publicly-known vulnerabilities. If the most
-recent security patches and updates are not installed, unauthorized
-users may take advantage of weaknesses in the unpatched software. The
-lack of prompt attention to patching could result in a system compromise.
- |
-
-
- Req-6.2 |
Ensure Oracle Linux GPG Key Installed |
To ensure the system can cryptographically verify base software
@@ -155,64 +155,64 @@
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg User Ownership |
+ Verify /boot/grub2/grub.cfg Group Ownership |
The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chown root /boot/grub2/grub.cfg
+To properly set the group owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chgrp root /boot/grub2/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg User Ownership |
+ Verify the UEFI Boot Loader grub.cfg Group Ownership |
The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chown root /boot/grub2/grub.cfg
+To properly set the group owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chgrp root /boot/grub2/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg Group Ownership |
+ Verify /boot/grub2/grub.cfg User Ownership |
The file /boot/grub2/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chgrp root /boot/grub2/grub.cfg
+To properly set the owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chown root /boot/grub2/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg Group Ownership |
+ Verify the UEFI Boot Loader grub.cfg User Ownership |
The file /boot/grub2/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chgrp root /boot/grub2/grub.cfg
+To properly set the owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chown root /boot/grub2/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
@@ -289,24 +289,42 @@
Req-8.1.8 |
- Set SSH Client Alive Count Max |
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation |
-The SSH server sends at most ClientAliveCountMax messages
-during a SSH session and waits for a response from the SSH client.
-The option ClientAliveInterval configures timeout after
-each ClientAliveCountMax message. If the SSH server does not
-receive a response from the client, then the connection is considered idle
-and terminated.
-For SSH earlier than v8.2, a ClientAliveCountMax value of 0
-causes an idle timeout precisely when the ClientAliveInterval is set.
-Starting with v8.2, a value of 0 disables the timeout functionality
-completely. If the option is set to a number greater than 0, then
-the idle session will be disconnected after
-ClientAliveInterval * ClientAliveCountMax seconds.
+If not already configured, ensure that users cannot change GNOME3 screensaver lock settings
+by adding /org/gnome/desktop/screensaver/idle-activation-enabled
+to /etc/dconf/db/local.d/00-security-settings.
+For example:
+/org/gnome/desktop/screensaver/idle-activation-enabled
+After the settings have been set, run dconf update.
|
-This ensures a user login will be terminated as soon as the ClientAliveInterval
-is reached.
+A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity
+of the information system but does not want to logout because of the temporary nature of the absense.
+ |
+
+
+ Req-8.1.8 |
+ Implement Blank Screensaver |
+
+
+
+
+To set the screensaver mode in the GNOME3 desktop to a blank screen,
+add or set picture-uri to string '' in
+/etc/dconf/db/local.d/00-security-settings. For example:
+[org/gnome/desktop/screensaver]
+picture-uri=''
+
+Once the settings have been added, add a lock to
/usr/share/doc/scap-security-guide/tables/table-ol8-anssirefs.html differs (HTML document, UTF-8 Unicode text)
--- old//usr/share/doc/scap-security-guide/tables/table-ol8-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol8-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,35 +42,73 @@
| Rationale |
- BP28(R1) NT007(R03) |
- Uninstall the telnet server |
+ BP28(R1) |
+ Uninstall telnet-server Package |
-The telnet daemon should be uninstalled.
+The telnet-server package can be removed with the following command:
+
+$ sudo yum erase telnet-server
|
-telnet allows clear text communications, and does not protect
-any data transmission between client and server. Any confidential data
-can be listened and no integrity checking is made.'
+It is detrimental for operating systems to provide, or install by default,
+functionality exceeding requirements or mission objectives. These
+unnecessary capabilities are often overlooked and therefore may remain
+unsecure. They increase the risk to the platform by providing additional
+attack vectors.
+
+The telnet service provides an unencrypted remote access service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session. If a privileged user were to login using this service, the
+privileged user password could be compromised.
+
+Removing the telnet-server package decreases the risk of the
+telnet service's accidental (or intentional) activation.
|
BP28(R1) |
- Uninstall rsh Package |
+ Uninstall ypserv Package |
-
-The rsh package contains the client commands
-
-for the rsh services
+The ypserv package can be removed with the following command:
+
+$ sudo yum erase ypserv
|
-These legacy clients contain numerous security exposures and have
-been replaced with the more secure SSH package. Even if the server is removed,
-it is best to ensure the clients are also removed to prevent users from
-inadvertently attempting to use these commands and therefore exposing
-
-their credentials. Note that removing the rsh package removes
+The NIS service provides an unencrypted authentication service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session.
-the clients for rsh,rcp, and rlogin.
+Removing the ypserv package decreases the risk of the accidental
+(or intentional) activation of NIS or NIS+ services.
+ |
+
+
+ BP28(R1) |
+ Uninstall rsh-server Package |
+
+The rsh-server package can be removed with the following command:
+
+$ sudo yum erase rsh-server
+ |
+
+The rsh-server service provides unencrypted remote access service which does not
+provide for the confidentiality and integrity of user passwords or the remote session and has very weak
+authentication. If a privileged user were to login using this service, the privileged user password
+could be compromised. The rsh-server package provides several obsolete and insecure
+network services. Removing it decreases the risk of those services' accidental (or intentional)
+activation.
+ |
+
+
+ BP28(R1) NT007(R03) |
+ Uninstall the telnet server |
+
+The telnet daemon should be uninstalled.
+ |
+
+telnet allows clear text communications, and does not protect
+any data transmission between client and server. Any confidential data
+can be listened and no integrity checking is made.'
|
@@ -106,47 +144,6 @@
BP28(R1) |
- Uninstall telnet-server Package |
-
-The telnet-server package can be removed with the following command:
-
-$ sudo yum erase telnet-server
- |
-
-It is detrimental for operating systems to provide, or install by default,
-functionality exceeding requirements or mission objectives. These
-unnecessary capabilities are often overlooked and therefore may remain
-unsecure. They increase the risk to the platform by providing additional
-attack vectors.
-
-The telnet service provides an unencrypted remote access service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session. If a privileged user were to login using this service, the
-privileged user password could be compromised.
-
-Removing the telnet-server package decreases the risk of the
-telnet service's accidental (or intentional) activation.
- |
-
-
- BP28(R1) |
- Uninstall ypserv Package |
-
-The ypserv package can be removed with the following command:
-
-$ sudo yum erase ypserv
- |
-
-The NIS service provides an unencrypted authentication service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session.
-
-Removing the ypserv package decreases the risk of the accidental
-(or intentional) activation of NIS or NIS+ services.
- |
-
-
- BP28(R1) |
Uninstall Sendmail Package |
Sendmail is not the default mail transfer agent and is
@@ -163,30 +160,38 @@
|
BP28(R1) |
- Uninstall talk-server Package |
+ Uninstall tftp-server Package |
-The talk-server package can be removed with the following command: $ sudo yum erase talk-server
+The tftp-server package can be removed with the following command: $ sudo yum erase tftp-server
|
-The talk software presents a security risk as it uses unencrypted protocols
-for communications. Removing the talk-server package decreases the
-risk of the accidental (or intentional) activation of talk services.
+Removing the tftp-server package decreases the risk of the accidental
+(or intentional) activation of tftp services.
+
+If TFTP is required for operational support (such as transmission of router
+configurations), its use must be documented with the Information Systems
+Securty Manager (ISSM), restricted to only authorized personnel, and have
+access control rules established.
|
BP28(R1) |
- Uninstall DHCP Server Package |
+ Uninstall rsh Package |
-If the system does not need to act as a DHCP server,
-the dhcp package can be uninstalled.
-The dhcp package can be removed with the following command:
-
-$ sudo yum erase dhcp
+The rsh package contains the client commands
+
+for the rsh services
|
-Removing the DHCP server ensures that it cannot be easily or
-accidentally reactivated and disrupt network operation.
+These legacy clients contain numerous security exposures and have
+been replaced with the more secure SSH package. Even if the server is removed,
+it is best to ensure the clients are also removed to prevent users from
+inadvertently attempting to use these commands and therefore exposing
+
+their credentials. Note that removing the rsh package removes
+
+the clients for rsh,rcp, and rlogin.
|
@@ -204,18 +209,18 @@
BP28(R1) |
- Uninstall tftp-server Package |
+ Uninstall DHCP Server Package |
/usr/share/doc/scap-security-guide/tables/table-ol8-cuirefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-ol8-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol8-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,15 @@
3.1.1 3.4.5 |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -59,6 +60,27 @@
|
+ 3.1.1 3.1.5 |
+ Verify Only Root Has UID 0 |
+
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
+ |
+
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
+ |
+
+
3.1.1 |
Disable GDM Guest Login |
@@ -76,6 +98,31 @@
|
+ 3.1.1 3.1.5 |
+ Disable SSH Access via Empty Passwords |
+
+Disallow SSH login with empty passwords.
+The default SSH configuration disables logins with empty passwords. The appropriate
+configuration is used if no value is set for PermitEmptyPasswords.
+
+To explicitly disallow SSH login from accounts with empty passwords,
+add or correct the following line in
+
+
+/etc/ssh/sshd_config:
+
+
+PermitEmptyPasswords no
+Any accounts with empty passwords should be disabled immediately, and PAM configuration
+should prevent users from being able to assign themselves empty passwords.
+ |
+
+Configuring this setting for the SSH daemon provides additional assurance
+that remote login via SSH will require a password, even in the event of
+misconfiguration elsewhere.
+ |
+
+
3.1.1 3.1.6 |
Direct root Logins Not Allowed |
@@ -103,17 +150,21 @@
|
3.1.1 3.1.5 |
- Restrict Serial Port Root Logins |
+ Prevent Login to Accounts With Empty Password |
-To restrict root logins on serial ports,
-ensure lines of this form do not appear in /etc/securetty:
-ttyS0
-ttyS1
+If an account is configured for password authentication
+but does not have an assigned password, it may be possible to log
+into the account without authentication. Remove any instances of the
+nullok in
+
+/etc/pam.d/system-auth
+
+to prevent logins with empty passwords.
|
-Preventing direct root login to serial port interfaces
-helps ensure accountability for actions taken on the systems
-using the root account.
+If an account has an empty password, anyone could log in and
+run commands with the privileges of that account. Accounts with
+empty passwords should never be used in operational environments.
|
@@ -134,41 +185,20 @@
- 3.1.1 3.1.5 |
- Restrict Virtual Console Root Logins |
-
-To restrict root logins through the (deprecated) virtual console devices,
-ensure lines of this form do not appear in /etc/securetty:
-vc/1
-vc/2
-vc/3
-vc/4
- |
-
-Preventing direct root login to virtual console devices
-helps ensure accountability for actions taken on the system
-using the root account.
- |
-
-
- 3.1.1 3.1.5 |
- Verify Only Root Has UID 0 |
+ 3.1.1 3.4.5 |
+ Require Authentication for Emergency Systemd Target |
-If any account other than root has a UID of 0, this misconfiguration should
-be investigated and the accounts other than root should be removed or have
-their UID changed.
-
-If the account is associated with system commands or applications the UID
-should be changed to one greater than "0" but less than "1000."
-Otherwise assign a UID greater than "1000" that has not already been
-assigned.
+Emergency mode is intended as a system recovery
+method, providing a single user root access to the system
+during a failed boot sequence.
+
+By default, Emergency mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/emergency.service.
|
-An account has root authority if it has a UID of 0. Multiple accounts
-with a UID of 0 afford more opportunity for potential intruders to
-guess a password for a privileged account. Proper configuration of
-sudo is recommended to afford multiple system administrators
-access to root privileges in an accountable manner.
+This prevents attackers with physical access from trivially bypassing security
+on the machine and gaining root access. Such accesses are further prevented
+by configuring the bootloader password.
|
@@ -193,65 +223,64 @@
- 3.1.1 3.4.5 |
- Require Authentication for Single User Mode |
+ 3.1.1 3.1.5 |
+ Restrict Virtual Console Root Logins |
-Single-user mode is intended as a system recovery
-method, providing a single user root access to the system by
-providing a boot option at startup. By default, no authentication
-is performed if single-user mode is selected.
-
-By default, single-user mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/rescue.service.
+To restrict root logins through the (deprecated) virtual console devices,
+ensure lines of this form do not appear in /etc/securetty:
+vc/1
+vc/2
+vc/3
+vc/4
|
-This prevents attackers with physical access from trivially bypassing security
-on the machine and gaining root access. Such accesses are further prevented
-by configuring the bootloader password.
+Preventing direct root login to virtual console devices
+helps ensure accountability for actions taken on the system
+using the root account.
|
/usr/share/doc/scap-security-guide/tables/table-ol8-nistrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-ol8-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol8-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,38 +42,16 @@
Rationale |
- AU-2(d) AU-12(c) CM-6(a) |
- Ensure auditd Collects File Deletion Events by User - rename |
-
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
- |
-
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
- |
-
-
IA-2 AC-3 CM-6(a) |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -82,142 +60,110 @@
|
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Access Events to Audit Log Directory |
+ IA-2 AC-6(5) IA-4(b) |
+ Verify Only Root Has UID 0 |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
|
- AU-2(d) AU-12(c) CM-6(a) |
- Record Events that Modify the System's Mandatory Access Controls |
+ AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F auid>=1000 -F auid!=unset -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
AU-2(d) AU-12(c) CM-6(a) |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
-accesses for all users and root. If the auditd daemon is configured
+At a minimum, the audit system should collect file permission
+changes for all users and root. If the auditd daemon is configured
to use the augenrules program to read audit rules during daemon
-startup (the default), add the following lines to a file with suffix
+startup (the default), add the following line to a file with suffix
.rules in the directory /etc/audit/rules.d:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
+utility to read audit rules during daemon startup, add the following line to
/etc/audit/audit.rules file:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
- |
-
-Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
-these events could serve as evidence of potential system compromise.
- |
-
-
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Logon and Logout Events - lastlog |
-
-The audit system already collects login information for all users
-and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following lines to a file with suffix .rules in the
-directory /etc/audit/rules.d in order to watch for attempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
-/etc/audit/audit.rules file in order to watch for unattempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
|
-Manual editing of these files may indicate nefarious activity, such
-as an attacker attempting to remove evidence of an intrusion.
+The changing of file permissions could indicate that a user is attempting to
+gain access to information that would otherwise be disallowed. Auditing DAC modifications
+can facilitate the identification of patterns of abuse among both authorized and
+unauthorized users.
|
AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Time Through clock_settime |
+ Record Access Events to Audit Log Directory |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
/usr/share/doc/scap-security-guide/tables/table-ol8-pcidssrefs.html differs (HTML document, ASCII text)
--- old//usr/share/doc/scap-security-guide/tables/table-ol8-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-ol8-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -76,6 +76,29 @@
|
Req-6.2 |
+ Ensure Software Patches Installed |
+
+
+If the system is joined to the ULN
+or a yum server, run the following command to install updates:
+$ sudo yum update
+If the system is not configured to use one of these sources, updates (in the form of RPM packages)
+can be manually downloaded from the ULN and installed using rpm.
+
+
+NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
+dictates.
+ |
+
+Installing software updates is a fundamental mitigation against
+the exploitation of publicly-known vulnerabilities. If the most
+recent security patches and updates are not installed, unauthorized
+users may take advantage of weaknesses in the unpatched software. The
+lack of prompt attention to patching could result in a system compromise.
+ |
+
+
+ Req-6.2 |
Ensure gpgcheck Enabled In Main yum Configuration |
The gpgcheck option controls whether
@@ -104,29 +127,6 @@
|
Req-6.2 |
- Ensure Software Patches Installed |
-
-
-If the system is joined to the ULN
-or a yum server, run the following command to install updates:
-$ sudo yum update
-If the system is not configured to use one of these sources, updates (in the form of RPM packages)
-can be manually downloaded from the ULN and installed using rpm.
-
-
-NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
-dictates.
- |
-
-Installing software updates is a fundamental mitigation against
-the exploitation of publicly-known vulnerabilities. If the most
-recent security patches and updates are not installed, unauthorized
-users may take advantage of weaknesses in the unpatched software. The
-lack of prompt attention to patching could result in a system compromise.
- |
-
-
- Req-6.2 |
Ensure Oracle Linux GPG Key Installed |
To ensure the system can cryptographically verify base software
@@ -155,64 +155,64 @@
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg User Ownership |
+ Verify /boot/grub2/grub.cfg Group Ownership |
-The file /boot/efi/EFI/redhat/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/grub2/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
+To properly set the group owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chgrp root /boot/grub2/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg User Ownership |
+ Verify the UEFI Boot Loader grub.cfg Group Ownership |
-The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/efi/EFI/redhat/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chown root /boot/grub2/grub.cfg
+To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg Group Ownership |
+ Verify /boot/grub2/grub.cfg User Ownership |
The file /boot/grub2/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chgrp root /boot/grub2/grub.cfg
+To properly set the owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chown root /boot/grub2/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg Group Ownership |
+ Verify the UEFI Boot Loader grub.cfg User Ownership |
The file /boot/efi/EFI/redhat/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
+To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
@@ -289,24 +289,42 @@
Req-8.1.8 |
- Set SSH Client Alive Count Max |
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation |
-The SSH server sends at most ClientAliveCountMax messages
-during a SSH session and waits for a response from the SSH client.
-The option ClientAliveInterval configures timeout after
-each ClientAliveCountMax message. If the SSH server does not
-receive a response from the client, then the connection is considered idle
-and terminated.
-For SSH earlier than v8.2, a ClientAliveCountMax value of 0
-causes an idle timeout precisely when the ClientAliveInterval is set.
-Starting with v8.2, a value of 0 disables the timeout functionality
-completely. If the option is set to a number greater than 0, then
-the idle session will be disconnected after
-ClientAliveInterval * ClientAliveCountMax seconds.
+If not already configured, ensure that users cannot change GNOME3 screensaver lock settings
+by adding /org/gnome/desktop/screensaver/idle-activation-enabled
+to /etc/dconf/db/local.d/00-security-settings.
+For example:
+/org/gnome/desktop/screensaver/idle-activation-enabled
+After the settings have been set, run dconf update.
|
-This ensures a user login will be terminated as soon as the ClientAliveInterval
-is reached.
+A session lock is a temporary action taken when a user stops work and moves away from the immediate physical vicinity
+of the information system but does not want to logout because of the temporary nature of the absense.
+ |
+
+
+ Req-8.1.8 |
+ Implement Blank Screensaver |
+
+
+
+
+To set the screensaver mode in the GNOME3 desktop to a blank screen,
+add or set picture-uri to string '' in
+/etc/dconf/db/local.d/00-security-settings. For example:
+[org/gnome/desktop/screensaver]
+picture-uri=''
/usr/share/doc/scap-security-guide/tables/table-rhcos4-nistrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhcos4-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhcos4-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,165 +42,128 @@
Rationale |
- AU-2(d) AU-12(c) CM-6(a) |
- Ensure auditd Collects File Deletion Events by User - rename |
+ IA-2 AC-3 CM-6(a) |
+ Require Authentication for Single User Mode |
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
+
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
+This prevents attackers with physical access from trivially bypassing security
+on the machine and gaining root access. Such accesses are further prevented
+by configuring the bootloader password.
|
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Access Events to Audit Log Directory |
+ IA-2 AC-6(5) IA-4(b) |
+ Verify Only Root Has UID 0 |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
|
- AU-2(d) AU-12(c) CM-6(a) |
- Record Events that Modify the System's Mandatory Access Controls |
+ AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
AU-2(d) AU-12(c) CM-6(a) |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
-accesses for all users and root. If the auditd daemon is configured
+At a minimum, the audit system should collect file permission
+changes for all users and root. If the auditd daemon is configured
to use the augenrules program to read audit rules during daemon
-startup (the default), add the following lines to a file with suffix
+startup (the default), add the following line to a file with suffix
.rules in the directory /etc/audit/rules.d:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
+utility to read audit rules during daemon startup, add the following line to
/etc/audit/audit.rules file:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
- |
-
-Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
-these events could serve as evidence of potential system compromise.
- |
-
-
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Logon and Logout Events - lastlog |
-
-The audit system already collects login information for all users
-and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following lines to a file with suffix .rules in the
-directory /etc/audit/rules.d in order to watch for attempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
-/etc/audit/audit.rules file in order to watch for unattempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
|
-Manual editing of these files may indicate nefarious activity, such
-as an attacker attempting to remove evidence of an intrusion.
+The changing of file permissions could indicate that a user is attempting to
+gain access to information that would otherwise be disallowed. Auditing DAC modifications
+can facilitate the identification of patterns of abuse among both authorized and
+unauthorized users.
|
AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Time Through clock_settime |
+ Record Access Events to Audit Log Directory |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--a always,exit -F arch=b32 -S clock_settime -F a0=0x0 -F key=time-change
-If the system is 64 bit then also add the following line:
--a always,exit -F arch=b64 -S clock_settime -F a0=0x0 -F key=time-change
+The audit system should collect access events to read audit log directory.
+The following audit rule will assure that access to audit log directory are
+collected.
+-a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
+If the auditd daemon is configured to use the augenrules
+program to read audit rules during daemon startup (the default), add the
+rule to a file with suffix .rules in the directory
+/etc/audit/rules.d.
/usr/share/doc/scap-security-guide/tables/table-rhel7-anssirefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel7-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel7-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,35 +42,73 @@
| Rationale |
- BP28(R1) NT007(R03) |
- Uninstall the telnet server |
+ BP28(R1) |
+ Uninstall telnet-server Package |
-The telnet daemon should be uninstalled.
+The telnet-server package can be removed with the following command:
+
+$ sudo yum erase telnet-server
|
-telnet allows clear text communications, and does not protect
-any data transmission between client and server. Any confidential data
-can be listened and no integrity checking is made.'
+It is detrimental for operating systems to provide, or install by default,
+functionality exceeding requirements or mission objectives. These
+unnecessary capabilities are often overlooked and therefore may remain
+unsecure. They increase the risk to the platform by providing additional
+attack vectors.
+
+The telnet service provides an unencrypted remote access service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session. If a privileged user were to login using this service, the
+privileged user password could be compromised.
+
+Removing the telnet-server package decreases the risk of the
+telnet service's accidental (or intentional) activation.
|
BP28(R1) |
- Uninstall rsh Package |
+ Uninstall ypserv Package |
-
-The rsh package contains the client commands
-
-for the rsh services
+The ypserv package can be removed with the following command:
+
+$ sudo yum erase ypserv
|
-These legacy clients contain numerous security exposures and have
-been replaced with the more secure SSH package. Even if the server is removed,
-it is best to ensure the clients are also removed to prevent users from
-inadvertently attempting to use these commands and therefore exposing
-
-their credentials. Note that removing the rsh package removes
+The NIS service provides an unencrypted authentication service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session.
-the clients for rsh,rcp, and rlogin.
+Removing the ypserv package decreases the risk of the accidental
+(or intentional) activation of NIS or NIS+ services.
+ |
+
+
+ BP28(R1) |
+ Uninstall rsh-server Package |
+
+The rsh-server package can be removed with the following command:
+
+$ sudo yum erase rsh-server
+ |
+
+The rsh-server service provides unencrypted remote access service which does not
+provide for the confidentiality and integrity of user passwords or the remote session and has very weak
+authentication. If a privileged user were to login using this service, the privileged user password
+could be compromised. The rsh-server package provides several obsolete and insecure
+network services. Removing it decreases the risk of those services' accidental (or intentional)
+activation.
+ |
+
+
+ BP28(R1) NT007(R03) |
+ Uninstall the telnet server |
+
+The telnet daemon should be uninstalled.
+ |
+
+telnet allows clear text communications, and does not protect
+any data transmission between client and server. Any confidential data
+can be listened and no integrity checking is made.'
|
@@ -106,47 +144,6 @@
BP28(R1) |
- Uninstall telnet-server Package |
-
-The telnet-server package can be removed with the following command:
-
-$ sudo yum erase telnet-server
- |
-
-It is detrimental for operating systems to provide, or install by default,
-functionality exceeding requirements or mission objectives. These
-unnecessary capabilities are often overlooked and therefore may remain
-unsecure. They increase the risk to the platform by providing additional
-attack vectors.
-
-The telnet service provides an unencrypted remote access service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session. If a privileged user were to login using this service, the
-privileged user password could be compromised.
-
-Removing the telnet-server package decreases the risk of the
-telnet service's accidental (or intentional) activation.
- |
-
-
- BP28(R1) |
- Uninstall ypserv Package |
-
-The ypserv package can be removed with the following command:
-
-$ sudo yum erase ypserv
- |
-
-The NIS service provides an unencrypted authentication service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session.
-
-Removing the ypserv package decreases the risk of the accidental
-(or intentional) activation of NIS or NIS+ services.
- |
-
-
- BP28(R1) |
Uninstall Sendmail Package |
Sendmail is not the default mail transfer agent and is
@@ -163,30 +160,38 @@
|
BP28(R1) |
- Uninstall talk-server Package |
+ Uninstall tftp-server Package |
-The talk-server package can be removed with the following command: $ sudo yum erase talk-server
+The tftp-server package can be removed with the following command: $ sudo yum erase tftp-server
|
-The talk software presents a security risk as it uses unencrypted protocols
-for communications. Removing the talk-server package decreases the
-risk of the accidental (or intentional) activation of talk services.
+Removing the tftp-server package decreases the risk of the accidental
+(or intentional) activation of tftp services.
+
+If TFTP is required for operational support (such as transmission of router
+configurations), its use must be documented with the Information Systems
+Securty Manager (ISSM), restricted to only authorized personnel, and have
+access control rules established.
|
BP28(R1) |
- Uninstall DHCP Server Package |
+ Uninstall rsh Package |
-If the system does not need to act as a DHCP server,
-the dhcp package can be uninstalled.
-The dhcp package can be removed with the following command:
-
-$ sudo yum erase dhcp
+The rsh package contains the client commands
+
+for the rsh services
|
-Removing the DHCP server ensures that it cannot be easily or
-accidentally reactivated and disrupt network operation.
+These legacy clients contain numerous security exposures and have
+been replaced with the more secure SSH package. Even if the server is removed,
+it is best to ensure the clients are also removed to prevent users from
+inadvertently attempting to use these commands and therefore exposing
+
+their credentials. Note that removing the rsh package removes
+
+the clients for rsh,rcp, and rlogin.
|
@@ -219,18 +224,18 @@
BP28(R1) |
- Uninstall tftp-server Package |
+ Uninstall DHCP Server Package |
/usr/share/doc/scap-security-guide/tables/table-rhel7-cisrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel7-cisrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel7-cisrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -63,6 +63,21 @@
1.1.1.2 |
+ Disable Mounting of freevxfs |
+
+
+To configure the system to prevent the freevxfs
+kernel module from being loaded, add the following line to the file /etc/modprobe.d/freevxfs.conf :
+install freevxfs /bin/true
+This effectively prevents usage of this uncommon filesystem.
+ |
+
+Linux kernel modules which implement filesystems that are not needed by the
+local system should be disabled.
+ |
+
+
+ 1.1.1.2 |
Disable Mounting of squashfs |
@@ -82,21 +97,6 @@
|
- 1.1.1.2 |
- Disable Mounting of freevxfs |
-
-
-To configure the system to prevent the freevxfs
-kernel module from being loaded, add the following line to the file /etc/modprobe.d/freevxfs.conf :
-install freevxfs /bin/true
-This effectively prevents usage of this uncommon filesystem.
- |
-
-Linux kernel modules which implement filesystems that are not needed by the
-local system should be disabled.
- |
-
-
1.1.1.3 |
Disable Mounting of udf |
@@ -570,34 +570,6 @@
|
1.2.3 |
- Ensure gpgcheck Enabled In Main yum Configuration |
-
-The gpgcheck option controls whether
-RPM packages' signatures are always checked prior to installation.
-To configure yum to check package signatures before installing
-them, ensure the following line appears in /etc/yum.conf in
-the [main] section:
-gpgcheck=1
- |
-
-Changes to any software components can have significant effects on the
-overall security of the operating system. This requirement ensures the
-software has not been tampered with and that it has been provided by a
-trusted vendor.
-
-Accordingly, patches, service packs, device drivers, or operating system
-components must be signed with a certificate recognized and approved by the
-organization.
- Verifying the authenticity of the software prior to installation
-validates the integrity of the patch or upgrade received from a vendor.
-This ensures the software has not been tampered with and that it has been
-provided by a trusted vendor. Self-signed certificates are disallowed by
-this requirement. Certificates used to verify the software must be from an
-approved Certificate Authority (CA).
- |
-
-
- 1.2.3 |
Ensure Red Hat GPG Key Installed |
To ensure the system can cryptographically verify base software packages
@@ -626,6 +598,34 @@
|
+ 1.2.3 |
+ Ensure gpgcheck Enabled In Main yum Configuration |
+
+The gpgcheck option controls whether
+RPM packages' signatures are always checked prior to installation.
+To configure yum to check package signatures before installing
+them, ensure the following line appears in /etc/yum.conf in
+the [main] section:
+gpgcheck=1
+ |
+
+Changes to any software components can have significant effects on the
+overall security of the operating system. This requirement ensures the
+software has not been tampered with and that it has been provided by a
+trusted vendor.
+
+Accordingly, patches, service packs, device drivers, or operating system
+components must be signed with a certificate recognized and approved by the
+organization.
+ Verifying the authenticity of the software prior to installation
+validates the integrity of the patch or upgrade received from a vendor.
+This ensures the software has not been tampered with and that it has been
+provided by a trusted vendor. Self-signed certificates are disallowed by
+this requirement. Certificates used to verify the software must be from an
+approved Certificate Authority (CA).
+ |
+
+
1.2.5 |
Disable Red Hat Network Service (rhnsd) |
@@ -646,18 +646,6 @@
|
1.3.1 |
- Install AIDE |
-
-The aide package can be installed with the following command:
-
-$ sudo yum install aide
- |
-
-The AIDE package must be installed if it is to be available for integrity checking.
- |
-
-
- 1.3.1 |
Build and Test AIDE Database |
Run the following command to generate a new database:
@@ -689,6 +677,18 @@
|
+ 1.3.1 |
+ Install AIDE |
+
+The aide package can be installed with the following command:
+
+$ sudo yum install aide
+ |
+
+The AIDE package must be installed if it is to be available for integrity checking.
+ |
+
+
1.3.2 |
Configure Periodic Execution of AIDE |
@@ -719,7 +719,7 @@
|
1.4.1 |
- Set Boot Loader Password in grub2 |
+ Set the UEFI Boot Loader Password |
The grub2 boot loader should have a superuser account and password
protection enabled to protect boot-time settings.
@@ -741,7 +741,7 @@
|
1.4.1 |
- Set the UEFI Boot Loader Password |
+ Set Boot Loader Password in grub2 |
The grub2 boot loader should have a superuser account and password
protection enabled to protect boot-time settings.
@@ -763,48 +763,32 @@
|
1.4.2 |
- Verify the UEFI Boot Loader grub.cfg User Ownership |
-
-The file /boot/efi/EFI/redhat/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
-
-To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
- |
-
-Only root should be able to modify important boot parameters.
- |
-
-
- 1.4.2 |
- Verify /boot/grub2/grub.cfg User Ownership |
+ Verify /boot/grub2/grub.cfg Group Ownership |
The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+be group-owned by the root group to prevent
+destruction or modification of the file.
/usr/share/doc/scap-security-guide/tables/table-rhel7-cuirefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel7-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel7-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,15 @@
|
3.1.1 3.4.5 |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -59,6 +60,27 @@
|
+ 3.1.1 3.1.5 |
+ Verify Only Root Has UID 0 |
+
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
+ |
+
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
+ |
+
+
3.1.1 |
Disable GDM Guest Login |
@@ -76,6 +98,31 @@
|
+ 3.1.1 3.1.5 |
+ Disable SSH Access via Empty Passwords |
+
+Disallow SSH login with empty passwords.
+The default SSH configuration disables logins with empty passwords. The appropriate
+configuration is used if no value is set for PermitEmptyPasswords.
+
+To explicitly disallow SSH login from accounts with empty passwords,
+add or correct the following line in
+
+
+/etc/ssh/sshd_config:
+
+
+PermitEmptyPasswords no
+Any accounts with empty passwords should be disabled immediately, and PAM configuration
+should prevent users from being able to assign themselves empty passwords.
+ |
+
+Configuring this setting for the SSH daemon provides additional assurance
+that remote login via SSH will require a password, even in the event of
+misconfiguration elsewhere.
+ |
+
+
3.1.1 3.1.6 |
Direct root Logins Not Allowed |
@@ -103,17 +150,21 @@
|
3.1.1 3.1.5 |
- Restrict Serial Port Root Logins |
+ Prevent Login to Accounts With Empty Password |
-To restrict root logins on serial ports,
-ensure lines of this form do not appear in /etc/securetty:
-ttyS0
-ttyS1
+If an account is configured for password authentication
+but does not have an assigned password, it may be possible to log
+into the account without authentication. Remove any instances of the
+nullok in
+
+/etc/pam.d/system-auth
+
+to prevent logins with empty passwords.
|
-Preventing direct root login to serial port interfaces
-helps ensure accountability for actions taken on the systems
-using the root account.
+If an account has an empty password, anyone could log in and
+run commands with the privileges of that account. Accounts with
+empty passwords should never be used in operational environments.
|
@@ -134,41 +185,20 @@
- 3.1.1 3.1.5 |
- Restrict Virtual Console Root Logins |
-
-To restrict root logins through the (deprecated) virtual console devices,
-ensure lines of this form do not appear in /etc/securetty:
-vc/1
-vc/2
-vc/3
-vc/4
- |
-
-Preventing direct root login to virtual console devices
-helps ensure accountability for actions taken on the system
-using the root account.
- |
-
-
- 3.1.1 3.1.5 |
- Verify Only Root Has UID 0 |
+ 3.1.1 3.4.5 |
+ Require Authentication for Emergency Systemd Target |
-If any account other than root has a UID of 0, this misconfiguration should
-be investigated and the accounts other than root should be removed or have
-their UID changed.
-
-If the account is associated with system commands or applications the UID
-should be changed to one greater than "0" but less than "1000."
-Otherwise assign a UID greater than "1000" that has not already been
-assigned.
+Emergency mode is intended as a system recovery
+method, providing a single user root access to the system
+during a failed boot sequence.
+
+By default, Emergency mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/emergency.service.
|
-An account has root authority if it has a UID of 0. Multiple accounts
-with a UID of 0 afford more opportunity for potential intruders to
-guess a password for a privileged account. Proper configuration of
-sudo is recommended to afford multiple system administrators
-access to root privileges in an accountable manner.
+This prevents attackers with physical access from trivially bypassing security
+on the machine and gaining root access. Such accesses are further prevented
+by configuring the bootloader password.
|
@@ -193,65 +223,64 @@
- 3.1.1 3.4.5 |
- Require Authentication for Single User Mode |
+ 3.1.1 3.1.5 |
+ Restrict Virtual Console Root Logins |
-Single-user mode is intended as a system recovery
-method, providing a single user root access to the system by
-providing a boot option at startup. By default, no authentication
-is performed if single-user mode is selected.
-
-By default, single-user mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/rescue.service.
+To restrict root logins through the (deprecated) virtual console devices,
+ensure lines of this form do not appear in /etc/securetty:
+vc/1
+vc/2
+vc/3
+vc/4
|
-This prevents attackers with physical access from trivially bypassing security
-on the machine and gaining root access. Such accesses are further prevented
-by configuring the bootloader password.
+Preventing direct root login to virtual console devices
+helps ensure accountability for actions taken on the system
+using the root account.
|
/usr/share/doc/scap-security-guide/tables/table-rhel7-nistrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel7-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel7-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,38 +42,16 @@
Rationale |
- AU-2(d) AU-12(c) CM-6(a) |
- Ensure auditd Collects File Deletion Events by User - rename |
-
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
- |
-
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
- |
-
-
IA-2 AC-3 CM-6(a) |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -82,142 +60,110 @@
|
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Access Events to Audit Log Directory |
+ IA-2 AC-6(5) IA-4(b) |
+ Verify Only Root Has UID 0 |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
|
- AU-2(d) AU-12(c) CM-6(a) |
- Record Events that Modify the System's Mandatory Access Controls |
+ AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
AU-2(d) AU-12(c) CM-6(a) |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
-accesses for all users and root. If the auditd daemon is configured
+At a minimum, the audit system should collect file permission
+changes for all users and root. If the auditd daemon is configured
to use the augenrules program to read audit rules during daemon
-startup (the default), add the following lines to a file with suffix
+startup (the default), add the following line to a file with suffix
.rules in the directory /etc/audit/rules.d:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
+utility to read audit rules during daemon startup, add the following line to
/etc/audit/audit.rules file:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
- |
-
-Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
-these events could serve as evidence of potential system compromise.
- |
-
-
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Logon and Logout Events - lastlog |
-
-The audit system already collects login information for all users
-and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following lines to a file with suffix .rules in the
-directory /etc/audit/rules.d in order to watch for attempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
-/etc/audit/audit.rules file in order to watch for unattempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
|
-Manual editing of these files may indicate nefarious activity, such
-as an attacker attempting to remove evidence of an intrusion.
+The changing of file permissions could indicate that a user is attempting to
+gain access to information that would otherwise be disallowed. Auditing DAC modifications
+can facilitate the identification of patterns of abuse among both authorized and
+unauthorized users.
|
AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Time Through clock_settime |
+ Record Access Events to Audit Log Directory |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
/usr/share/doc/scap-security-guide/tables/table-rhel7-ospprefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel7-ospprefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel7-ospprefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -53,6 +53,28 @@
|
FAU_GEN.1 |
+ Enable auditd Service |
+
+The auditd service is an essential userspace component of
+the Linux Auditing System, as it is responsible for writing audit records to
+disk.
+
+The auditd service can be enabled with the following command:
+$ sudo systemctl enable auditd.service
+ |
+
+Without establishing what type of events occurred, it would be difficult
+to establish, correlate, and investigate the events leading up to an outage or attack.
+Ensuring the auditd service is active ensures audit records
+generated by the kernel are appropriately recorded.
+
+Additionally, a properly configured audit subsystem ensures that actions of
+individual system users can be uniquely traced to those users so they
+can be held accountable for their actions.
+ |
+
+
+ FAU_GEN.1 |
Set number of records to cause an explicit flush to audit logs |
To configure Audit daemon to issue an explicit flush to disk command
@@ -88,28 +110,6 @@
|
FAU_GEN.1 |
- Enable auditd Service |
-
-The auditd service is an essential userspace component of
-the Linux Auditing System, as it is responsible for writing audit records to
-disk.
-
-The auditd service can be enabled with the following command:
-$ sudo systemctl enable auditd.service
- |
-
-Without establishing what type of events occurred, it would be difficult
-to establish, correlate, and investigate the events leading up to an outage or attack.
-Ensuring the auditd service is active ensures audit records
-generated by the kernel are appropriately recorded.
-
-Additionally, a properly configured audit subsystem ensures that actions of
-individual system users can be uniquely traced to those users so they
-can be held accountable for their actions.
- |
-
-
- FAU_GEN.1 |
Include Local Events in Audit Logs |
To configure Audit daemon to include local events in Audit logs, set
@@ -123,190 +123,127 @@
|
FAU_GEN.1.1.c |
- Ensure auditd Collects File Deletion Events by User - rename |
-
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
- |
-
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
- |
-
-
- FAU_GEN.1.1.c |
- Record Access Events to Audit Log Directory |
+ Record Events that Modify User/Group Information via open syscall - /etc/gshadow |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
+The audit system should collect write events to /etc/gshadow file for all users and root.
+If the auditd daemon is configured
+to use the augenrules program to read audit rules during daemon
+startup (the default), add the following lines to a file with suffix
+.rules in the directory /etc/audit/rules.d:
+-a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/gshadow -F auid>=1000 -F auid!=unset -F key=user-modify
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+utility to read audit rules during daemon startup, add the following lines to
+/etc/audit/audit.rules file:
+-a always,exit -F arch=b32 -S open -F a1&03 -F path=/etc/gshadow -F auid>=1000 -F auid!=unset -F key=user-modify
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S open -F a1&03 -F path=/etc/gshadow -F auid>=1000 -F auid!=unset -F key=user-modify
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+Creation of users through direct edition of /etc/gshadow could be an indicator of malicious activity on a system.
+Auditing these events could serve as evidence of potential system compromise.
|
FAU_GEN.1.1.c |
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd |
+ Encrypt Audit Records Sent With audispd Plugin |
-At a minimum, the audit system should collect the execution of
-privileged commands for all users and root. If the auditd daemon is
-configured to use the augenrules program to read audit rules during
-daemon startup (the default), add a line of the following form to a file with
-suffix .rules in the directory /etc/audit/rules.d:
--a always,exit -F path=/usr/sbin/unix_chkpwd -F auid>=1000 -F auid!=unset -F key=privileged
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add a line of the following
-form to /etc/audit/audit.rules:
--a always,exit -F path=/usr/sbin/unix_chkpwd -F auid>=1000 -F auid!=unset -F key=privileged
+Configure the operating system to encrypt the transfer of off-loaded audit
+records onto a different system or media from the system being audited.
+
+Uncomment the enable_krb5 option in /etc/audisp/audisp-remote.conf ,
+and set it with the following line:
+enable_krb5 = yes
|
-Misuse of privileged functions, either intentionally or unintentionally by
-authorized users, or by unauthorized external entities that have compromised system accounts,
-is a serious and ongoing concern and can have significant adverse impacts on organizations.
-Auditing the use of privileged functions is one way to detect such misuse and identify
-the risk from insider and advanced persistent threats.
-
-Privileged programs are subject to escalation-of-privilege attacks,
-which attempt to subvert their normal role of providing some necessary but
-limited capability. As such, motivation exists to monitor these programs for
-unusual activity.
+Information stored in one location is vulnerable to accidental or incidental deletion
+or alteration. Off-loading is a common process in information systems with limited
+audit storage capacity.
|
FAU_GEN.1.1.c |
- Record Events that Modify the System's Mandatory Access Controls |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
FAU_GEN.1.1.c |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
/usr/share/doc/scap-security-guide/tables/table-rhel7-pcidssrefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel7-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel7-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -76,30 +76,25 @@
|
Req-6.2 |
- Ensure gpgcheck Enabled In Main yum Configuration |
+ Ensure Software Patches Installed |
-The gpgcheck option controls whether
-RPM packages' signatures are always checked prior to installation.
-To configure yum to check package signatures before installing
-them, ensure the following line appears in /etc/yum.conf in
-the [main] section:
-gpgcheck=1
+
+If the system is joined to the Red Hat Network, a Red Hat Satellite Server,
+or a yum server, run the following command to install updates:
+$ sudo yum update
+If the system is not configured to use one of these sources, updates (in the form of RPM packages)
+can be manually downloaded from the Red Hat Network and installed using rpm.
+
+
+NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
+dictates.
|
-Changes to any software components can have significant effects on the
-overall security of the operating system. This requirement ensures the
-software has not been tampered with and that it has been provided by a
-trusted vendor.
-
-Accordingly, patches, service packs, device drivers, or operating system
-components must be signed with a certificate recognized and approved by the
-organization.
- Verifying the authenticity of the software prior to installation
-validates the integrity of the patch or upgrade received from a vendor.
-This ensures the software has not been tampered with and that it has been
-provided by a trusted vendor. Self-signed certificates are disallowed by
-this requirement. Certificates used to verify the software must be from an
-approved Certificate Authority (CA).
+Installing software updates is a fundamental mitigation against
+the exploitation of publicly-known vulnerabilities. If the most
+recent security patches and updates are not installed, unauthorized
+users may take advantage of weaknesses in the unpatched software. The
+lack of prompt attention to patching could result in a system compromise.
|
@@ -133,87 +128,92 @@
Req-6.2 |
- Ensure Software Patches Installed |
+ Ensure gpgcheck Enabled In Main yum Configuration |
-
-If the system is joined to the Red Hat Network, a Red Hat Satellite Server,
-or a yum server, run the following command to install updates:
-$ sudo yum update
-If the system is not configured to use one of these sources, updates (in the form of RPM packages)
-can be manually downloaded from the Red Hat Network and installed using rpm.
-
-
-NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
-dictates.
+The gpgcheck option controls whether
+RPM packages' signatures are always checked prior to installation.
+To configure yum to check package signatures before installing
+them, ensure the following line appears in /etc/yum.conf in
+the [main] section:
+gpgcheck=1
|
-Installing software updates is a fundamental mitigation against
-the exploitation of publicly-known vulnerabilities. If the most
-recent security patches and updates are not installed, unauthorized
-users may take advantage of weaknesses in the unpatched software. The
-lack of prompt attention to patching could result in a system compromise.
+Changes to any software components can have significant effects on the
+overall security of the operating system. This requirement ensures the
+software has not been tampered with and that it has been provided by a
+trusted vendor.
+
+Accordingly, patches, service packs, device drivers, or operating system
+components must be signed with a certificate recognized and approved by the
+organization.
+ Verifying the authenticity of the software prior to installation
+validates the integrity of the patch or upgrade received from a vendor.
+This ensures the software has not been tampered with and that it has been
+provided by a trusted vendor. Self-signed certificates are disallowed by
+this requirement. Certificates used to verify the software must be from an
+approved Certificate Authority (CA).
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg User Ownership |
+ Verify /boot/grub2/grub.cfg Group Ownership |
-The file /boot/efi/EFI/redhat/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/grub2/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
+To properly set the group owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chgrp root /boot/grub2/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg User Ownership |
+ Verify the UEFI Boot Loader grub.cfg Group Ownership |
-The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/efi/EFI/redhat/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chown root /boot/grub2/grub.cfg
+To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg Group Ownership |
+ Verify /boot/grub2/grub.cfg User Ownership |
The file /boot/grub2/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chgrp root /boot/grub2/grub.cfg
+To properly set the owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chown root /boot/grub2/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg Group Ownership |
+ Verify the UEFI Boot Loader grub.cfg User Ownership |
The file /boot/efi/EFI/redhat/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
+To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
@@ -290,24 +290,42 @@
Req-8.1.8 |
- Set SSH Client Alive Count Max |
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation |
-The SSH server sends at most ClientAliveCountMax messages
-during a SSH session and waits for a response from the SSH client.
-The option ClientAliveInterval configures timeout after
-each ClientAliveCountMax message. If the SSH server does not
-receive a response from the client, then the connection is considered idle
-and terminated.
-For SSH earlier than v8.2, a ClientAliveCountMax value of 0
/usr/share/doc/scap-security-guide/tables/table-rhel8-anssirefs.html differs (HTML document, UTF-8 Unicode text)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel8-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel8-anssirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,35 +42,73 @@
| Rationale |
- BP28(R1) NT007(R03) |
- Uninstall the telnet server |
+ BP28(R1) |
+ Uninstall telnet-server Package |
-The telnet daemon should be uninstalled.
+The telnet-server package can be removed with the following command:
+
+$ sudo yum erase telnet-server
|
-telnet allows clear text communications, and does not protect
-any data transmission between client and server. Any confidential data
-can be listened and no integrity checking is made.'
+It is detrimental for operating systems to provide, or install by default,
+functionality exceeding requirements or mission objectives. These
+unnecessary capabilities are often overlooked and therefore may remain
+unsecure. They increase the risk to the platform by providing additional
+attack vectors.
+
+The telnet service provides an unencrypted remote access service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session. If a privileged user were to login using this service, the
+privileged user password could be compromised.
+
+Removing the telnet-server package decreases the risk of the
+telnet service's accidental (or intentional) activation.
|
BP28(R1) |
- Uninstall rsh Package |
+ Uninstall ypserv Package |
-
-The rsh package contains the client commands
-
-for the rsh services
+The ypserv package can be removed with the following command:
+
+$ sudo yum erase ypserv
|
-These legacy clients contain numerous security exposures and have
-been replaced with the more secure SSH package. Even if the server is removed,
-it is best to ensure the clients are also removed to prevent users from
-inadvertently attempting to use these commands and therefore exposing
-
-their credentials. Note that removing the rsh package removes
+The NIS service provides an unencrypted authentication service which does
+not provide for the confidentiality and integrity of user passwords or the
+remote session.
-the clients for rsh,rcp, and rlogin.
+Removing the ypserv package decreases the risk of the accidental
+(or intentional) activation of NIS or NIS+ services.
+ |
+
+
+ BP28(R1) |
+ Uninstall rsh-server Package |
+
+The rsh-server package can be removed with the following command:
+
+$ sudo yum erase rsh-server
+ |
+
+The rsh-server service provides unencrypted remote access service which does not
+provide for the confidentiality and integrity of user passwords or the remote session and has very weak
+authentication. If a privileged user were to login using this service, the privileged user password
+could be compromised. The rsh-server package provides several obsolete and insecure
+network services. Removing it decreases the risk of those services' accidental (or intentional)
+activation.
+ |
+
+
+ BP28(R1) NT007(R03) |
+ Uninstall the telnet server |
+
+The telnet daemon should be uninstalled.
+ |
+
+telnet allows clear text communications, and does not protect
+any data transmission between client and server. Any confidential data
+can be listened and no integrity checking is made.'
|
@@ -106,47 +144,6 @@
BP28(R1) |
- Uninstall telnet-server Package |
-
-The telnet-server package can be removed with the following command:
-
-$ sudo yum erase telnet-server
- |
-
-It is detrimental for operating systems to provide, or install by default,
-functionality exceeding requirements or mission objectives. These
-unnecessary capabilities are often overlooked and therefore may remain
-unsecure. They increase the risk to the platform by providing additional
-attack vectors.
-
-The telnet service provides an unencrypted remote access service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session. If a privileged user were to login using this service, the
-privileged user password could be compromised.
-
-Removing the telnet-server package decreases the risk of the
-telnet service's accidental (or intentional) activation.
- |
-
-
- BP28(R1) |
- Uninstall ypserv Package |
-
-The ypserv package can be removed with the following command:
-
-$ sudo yum erase ypserv
- |
-
-The NIS service provides an unencrypted authentication service which does
-not provide for the confidentiality and integrity of user passwords or the
-remote session.
-
-Removing the ypserv package decreases the risk of the accidental
-(or intentional) activation of NIS or NIS+ services.
- |
-
-
- BP28(R1) |
Uninstall Sendmail Package |
Sendmail is not the default mail transfer agent and is
@@ -163,30 +160,38 @@
|
BP28(R1) |
- Uninstall talk-server Package |
+ Uninstall tftp-server Package |
-The talk-server package can be removed with the following command: $ sudo yum erase talk-server
+The tftp-server package can be removed with the following command: $ sudo yum erase tftp-server
|
-The talk software presents a security risk as it uses unencrypted protocols
-for communications. Removing the talk-server package decreases the
-risk of the accidental (or intentional) activation of talk services.
+Removing the tftp-server package decreases the risk of the accidental
+(or intentional) activation of tftp services.
+
+If TFTP is required for operational support (such as transmission of router
+configurations), its use must be documented with the Information Systems
+Securty Manager (ISSM), restricted to only authorized personnel, and have
+access control rules established.
|
BP28(R1) |
- Uninstall DHCP Server Package |
+ Uninstall rsh Package |
-If the system does not need to act as a DHCP server,
-the dhcp package can be uninstalled.
-The dhcp-server package can be removed with the following command:
-
-$ sudo yum erase dhcp-server
+The rsh package contains the client commands
+
+for the rsh services
|
-Removing the DHCP server ensures that it cannot be easily or
-accidentally reactivated and disrupt network operation.
+These legacy clients contain numerous security exposures and have
+been replaced with the more secure SSH package. Even if the server is removed,
+it is best to ensure the clients are also removed to prevent users from
+inadvertently attempting to use these commands and therefore exposing
+
+their credentials. Note that removing the rsh package removes
+
+the clients for rsh,rcp, and rlogin.
|
@@ -219,18 +224,18 @@
BP28(R1) |
- Uninstall tftp-server Package |
+ Uninstall DHCP Server Package |
/usr/share/doc/scap-security-guide/tables/table-rhel8-cisrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel8-cisrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel8-cisrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -672,44 +672,44 @@
1.5.1 |
- Verify the UEFI Boot Loader grub.cfg User Ownership |
+ Verify /boot/grub2/grub.cfg Group Ownership |
-The file /boot/efi/EFI/redhat/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/grub2/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
+To properly set the group owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chgrp root /boot/grub2/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
1.5.1 |
- Verify /boot/grub2/grub.cfg User Ownership |
+ Verify the UEFI Boot Loader grub.cfg Permissions |
-The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+File permissions for /boot/efi/EFI/redhat/grub.cfg should be set to 700.
-To properly set the owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chown root /boot/grub2/grub.cfg
+To properly set the permissions of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chmod 700 /boot/efi/EFI/redhat/grub.cfg
|
-Only root should be able to modify important boot parameters.
+Proper permissions ensure that only the root user can modify important boot
+parameters.
|
1.5.1 |
- Verify /boot/grub2/grub.cfg Group Ownership |
+ Verify the UEFI Boot Loader grub.cfg Group Ownership |
-The file /boot/grub2/grub.cfg should
+The file /boot/efi/EFI/redhat/grub.cfg should
be group-owned by the root group to prevent
destruction or modification of the file.
-To properly set the group owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chgrp root /boot/grub2/grub.cfg
+To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
|
The root group is a highly-privileged group. Furthermore, the group-owner of this
@@ -718,51 +718,51 @@
|
1.5.1 |
- Verify the UEFI Boot Loader grub.cfg Group Ownership |
+ Verify /boot/grub2/grub.cfg Permissions |
-The file /boot/efi/EFI/redhat/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+File permissions for /boot/grub2/grub.cfg should be set to 600.
-To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
+To properly set the permissions of /boot/grub2/grub.cfg , run the command:
+$ sudo chmod 600 /boot/grub2/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Proper permissions ensure that only the root user can modify important boot
+parameters.
|
1.5.1 |
- Verify the UEFI Boot Loader grub.cfg Permissions |
+ Verify /boot/grub2/grub.cfg User Ownership |
-File permissions for /boot/efi/EFI/redhat/grub.cfg should be set to 700.
+The file /boot/grub2/grub.cfg should
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the permissions of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chmod 700 /boot/efi/EFI/redhat/grub.cfg
+To properly set the owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chown root /boot/grub2/grub.cfg
|
-Proper permissions ensure that only the root user can modify important boot
-parameters.
+Only root should be able to modify important boot parameters.
|
1.5.1 |
- Verify /boot/grub2/grub.cfg Permissions |
+ Verify the UEFI Boot Loader grub.cfg User Ownership |
-File permissions for /boot/grub2/grub.cfg should be set to 600.
+The file /boot/efi/EFI/redhat/grub.cfg should
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the permissions of /boot/grub2/grub.cfg , run the command:
-$ sudo chmod 600 /boot/grub2/grub.cfg
+To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
|
-Proper permissions ensure that only the root user can modify important boot
-parameters.
+Only root should be able to modify important boot parameters.
|
1.5.2 |
- Set Boot Loader Password in grub2 |
+ Set the UEFI Boot Loader Password |
The grub2 boot loader should have a superuser account and password
protection enabled to protect boot-time settings.
@@ -784,7 +784,7 @@
|
1.5.2 |
- Set the UEFI Boot Loader Password |
+ Set Boot Loader Password in grub2 |
The grub2 boot loader should have a superuser account and password
protection enabled to protect boot-time settings.
@@ -806,14 +806,15 @@
|
1.5.3 |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -823,15 +824,14 @@
|
1.5.3 |
- Require Authentication for Single User Mode |
+ Require Authentication for Emergency Systemd Target |
-Single-user mode is intended as a system recovery
-method, providing a single user root access to the system by
-providing a boot option at startup. By default, no authentication
-is performed if single-user mode is selected.
+Emergency mode is intended as a system recovery
+method, providing a single user root access to the system
+during a failed boot sequence.
-By default, single-user mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/rescue.service.
+By default, Emergency mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/emergency.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -863,17 +863,17 @@
|
1.6.1 |
- Disable Core Dumps for SUID programs |
+ Disable Core Dumps for All Users |
-To set the runtime status of the fs.suid_dumpable kernel parameter, run the following command: $ sudo sysctl -w fs.suid_dumpable=0
-To make sure that the setting is persistent, add the following line to a file in the directory /etc/sysctl.d: fs.suid_dumpable = 0
/usr/share/doc/scap-security-guide/tables/table-rhel8-cuirefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel8-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel8-cuirefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,15 @@
|
3.1.1 3.4.5 |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -59,6 +60,27 @@
|
+ 3.1.1 3.1.5 |
+ Verify Only Root Has UID 0 |
+
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
+ |
+
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
+ |
+
+
3.1.1 |
Disable GDM Guest Login |
@@ -76,6 +98,31 @@
|
+ 3.1.1 3.1.5 |
+ Disable SSH Access via Empty Passwords |
+
+Disallow SSH login with empty passwords.
+The default SSH configuration disables logins with empty passwords. The appropriate
+configuration is used if no value is set for PermitEmptyPasswords.
+
+To explicitly disallow SSH login from accounts with empty passwords,
+add or correct the following line in
+
+
+/etc/ssh/sshd_config:
+
+
+PermitEmptyPasswords no
+Any accounts with empty passwords should be disabled immediately, and PAM configuration
+should prevent users from being able to assign themselves empty passwords.
+ |
+
+Configuring this setting for the SSH daemon provides additional assurance
+that remote login via SSH will require a password, even in the event of
+misconfiguration elsewhere.
+ |
+
+
3.1.1 3.1.6 |
Direct root Logins Not Allowed |
@@ -103,17 +150,21 @@
|
3.1.1 3.1.5 |
- Restrict Serial Port Root Logins |
+ Prevent Login to Accounts With Empty Password |
-To restrict root logins on serial ports,
-ensure lines of this form do not appear in /etc/securetty:
-ttyS0
-ttyS1
+If an account is configured for password authentication
+but does not have an assigned password, it may be possible to log
+into the account without authentication. Remove any instances of the
+nullok in
+
+/etc/pam.d/system-auth
+
+to prevent logins with empty passwords.
|
-Preventing direct root login to serial port interfaces
-helps ensure accountability for actions taken on the systems
-using the root account.
+If an account has an empty password, anyone could log in and
+run commands with the privileges of that account. Accounts with
+empty passwords should never be used in operational environments.
|
@@ -134,41 +185,20 @@
- 3.1.1 3.1.5 |
- Restrict Virtual Console Root Logins |
-
-To restrict root logins through the (deprecated) virtual console devices,
-ensure lines of this form do not appear in /etc/securetty:
-vc/1
-vc/2
-vc/3
-vc/4
- |
-
-Preventing direct root login to virtual console devices
-helps ensure accountability for actions taken on the system
-using the root account.
- |
-
-
- 3.1.1 3.1.5 |
- Verify Only Root Has UID 0 |
+ 3.1.1 3.4.5 |
+ Require Authentication for Emergency Systemd Target |
-If any account other than root has a UID of 0, this misconfiguration should
-be investigated and the accounts other than root should be removed or have
-their UID changed.
-
-If the account is associated with system commands or applications the UID
-should be changed to one greater than "0" but less than "1000."
-Otherwise assign a UID greater than "1000" that has not already been
-assigned.
+Emergency mode is intended as a system recovery
+method, providing a single user root access to the system
+during a failed boot sequence.
+
+By default, Emergency mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/emergency.service.
|
-An account has root authority if it has a UID of 0. Multiple accounts
-with a UID of 0 afford more opportunity for potential intruders to
-guess a password for a privileged account. Proper configuration of
-sudo is recommended to afford multiple system administrators
-access to root privileges in an accountable manner.
+This prevents attackers with physical access from trivially bypassing security
+on the machine and gaining root access. Such accesses are further prevented
+by configuring the bootloader password.
|
@@ -193,65 +223,64 @@
- 3.1.1 3.4.5 |
- Require Authentication for Single User Mode |
+ 3.1.1 3.1.5 |
+ Restrict Virtual Console Root Logins |
-Single-user mode is intended as a system recovery
-method, providing a single user root access to the system by
-providing a boot option at startup. By default, no authentication
-is performed if single-user mode is selected.
-
-By default, single-user mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/rescue.service.
+To restrict root logins through the (deprecated) virtual console devices,
+ensure lines of this form do not appear in /etc/securetty:
+vc/1
+vc/2
+vc/3
+vc/4
|
-This prevents attackers with physical access from trivially bypassing security
-on the machine and gaining root access. Such accesses are further prevented
-by configuring the bootloader password.
+Preventing direct root login to virtual console devices
+helps ensure accountability for actions taken on the system
+using the root account.
|
/usr/share/doc/scap-security-guide/tables/table-rhel8-nistrefs.html differs (HTML document, UTF-8 Unicode text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel8-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel8-nistrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -42,38 +42,16 @@
Rationale |
- AU-2(d) AU-12(c) CM-6(a) |
- Ensure auditd Collects File Deletion Events by User - rename |
-
-At a minimum, the audit system should collect file deletion events
-for all users and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file, setting ARCH to either b32 or b64 as
-appropriate for your system:
--a always,exit -F arch=ARCH -S rename -F auid>=1000 -F auid!=unset -F key=delete
- |
-
-Auditing file deletions will create an audit trail for files that are removed
-from the system. The audit trail could aid in system troubleshooting, as well as, detecting
-malicious processes that attempt to delete log files to conceal their presence.
- |
-
-
IA-2 AC-3 CM-6(a) |
- Require Authentication for Emergency Systemd Target |
+ Require Authentication for Single User Mode |
-Emergency mode is intended as a system recovery
-method, providing a single user root access to the system
-during a failed boot sequence.
+Single-user mode is intended as a system recovery
+method, providing a single user root access to the system by
+providing a boot option at startup. By default, no authentication
+is performed if single-user mode is selected.
-By default, Emergency mode is protected by requiring a password and is set
-in /usr/lib/systemd/system/emergency.service.
+By default, single-user mode is protected by requiring a password and is set
+in /usr/lib/systemd/system/rescue.service.
|
This prevents attackers with physical access from trivially bypassing security
@@ -82,142 +60,110 @@
|
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Access Events to Audit Log Directory |
+ IA-2 AC-6(5) IA-4(b) |
+ Verify Only Root Has UID 0 |
-The audit system should collect access events to read audit log directory.
-The following audit rule will assure that access to audit log directory are
-collected.
--a always,exit -F dir=/var/log/audit/ -F perm=r -F auid>=1000 -F auid!=unset -F key=access-audit-trail
-If the auditd daemon is configured to use the augenrules
-program to read audit rules during daemon startup (the default), add the
-rule to a file with suffix .rules in the directory
-/etc/audit/rules.d.
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the rule to
-/etc/audit/audit.rules file.
+If any account other than root has a UID of 0, this misconfiguration should
+be investigated and the accounts other than root should be removed or have
+their UID changed.
+
+If the account is associated with system commands or applications the UID
+should be changed to one greater than "0" but less than "1000."
+Otherwise assign a UID greater than "1000" that has not already been
+assigned.
|
-Attempts to read the logs should be recorded, suspicious access to audit log files could be an indicator of malicious activity on a system.
-Auditing these events could serve as evidence of potential system compromise.'
+An account has root authority if it has a UID of 0. Multiple accounts
+with a UID of 0 afford more opportunity for potential intruders to
+guess a password for a privileged account. Proper configuration of
+sudo is recommended to afford multiple system administrators
+access to root privileges in an accountable manner.
|
- AU-2(d) AU-12(c) CM-6(a) |
- Record Events that Modify the System's Mandatory Access Controls |
+ AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
--w /etc/selinux/ -p wa -k MAC-policy
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following line to
-/etc/audit/audit.rules file:
--w /etc/selinux/ -p wa -k MAC-policy
+To capture kernel module unloading events, use following line, setting ARCH to
+either b32 for 32-bit system, or having two lines for both b32 and b64 in case your system is 64-bit:
+
+-a always,exit -F arch=ARCH -S delete_module -F auid>=1000 -F auid!=unset -F key=modules
+
+
+Place to add the line depends on a way auditd daemon is configured. If it is configured
+to use the augenrules program (the default), add the line to a file with suffix
+.rules in the directory /etc/audit/rules.d.
+
+If the auditd daemon is configured to use the auditctl utility,
+add the line to file /etc/audit/audit.rules.
|
-The system's mandatory access policy (SELinux) should not be
-arbitrarily changed by anything other than administrator action. All changes to
-MAC policy should be audited.
+The removal of kernel modules can be used to alter the behavior of
+the kernel and potentially introduce malicious code into kernel space. It is important
+to have an audit trail of modules that have been introduced into the kernel.
|
AU-2(d) AU-12(c) CM-6(a) |
- Record Unsuccessful Access Attempts to Files - creat |
+ Record Events that Modify the System's Discretionary Access Controls - fchownat |
-At a minimum, the audit system should collect unauthorized file
-accesses for all users and root. If the auditd daemon is configured
+At a minimum, the audit system should collect file permission
+changes for all users and root. If the auditd daemon is configured
to use the augenrules program to read audit rules during daemon
-startup (the default), add the following lines to a file with suffix
+startup (the default), add the following line to a file with suffix
.rules in the directory /etc/audit/rules.d:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
+utility to read audit rules during daemon startup, add the following line to
/etc/audit/audit.rules file:
--a always,exit -F arch=b32 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b32 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
-If the system is 64 bit then also add the following lines:
-
--a always,exit -F arch=b64 -S creat -F exit=-EACCES -F auid>=1000 -F auid!=unset -F key=access
--a always,exit -F arch=b64 -S creat -F exit=-EPERM -F auid>=1000 -F auid!=unset -F key=access
- |
-
-Unsuccessful attempts to access files could be an indicator of malicious activity on a system. Auditing
-these events could serve as evidence of potential system compromise.
- |
-
-
- AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Logon and Logout Events - lastlog |
-
-The audit system already collects login information for all users
-and root. If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following lines to a file with suffix .rules in the
-directory /etc/audit/rules.d in order to watch for attempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
-If the auditd daemon is configured to use the auditctl
-utility to read audit rules during daemon startup, add the following lines to
-/etc/audit/audit.rules file in order to watch for unattempted manual
-edits of files involved in storing logon events:
--w /var/log/lastlog -p wa -k logins
+-a always,exit -F arch=b32 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
+If the system is 64 bit then also add the following line:
+-a always,exit -F arch=b64 -S fchownat -F auid>=1000 -F auid!=unset -F key=perm_mod
|
-Manual editing of these files may indicate nefarious activity, such
-as an attacker attempting to remove evidence of an intrusion.
+The changing of file permissions could indicate that a user is attempting to
+gain access to information that would otherwise be disallowed. Auditing DAC modifications
+can facilitate the identification of patterns of abuse among both authorized and
+unauthorized users.
|
AU-2(d) AU-12(c) AC-6(9) CM-6(a) |
- Record Attempts to Alter Time Through clock_settime |
+ Record Access Events to Audit Log Directory |
-If the auditd daemon is configured to use the
-augenrules program to read audit rules during daemon startup (the
-default), add the following line to a file with suffix .rules in the
-directory /etc/audit/rules.d:
/usr/share/doc/scap-security-guide/tables/table-rhel8-pcidssrefs.html differs (HTML document, ASCII text, with very long lines)
--- old//usr/share/doc/scap-security-guide/tables/table-rhel8-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/doc/scap-security-guide/tables/table-rhel8-pcidssrefs.html 2022-07-15 00:00:00.000000000 +0000
@@ -76,30 +76,25 @@
|
Req-6.2 |
- Ensure gpgcheck Enabled In Main yum Configuration |
+ Ensure Software Patches Installed |
-The gpgcheck option controls whether
-RPM packages' signatures are always checked prior to installation.
-To configure yum to check package signatures before installing
-them, ensure the following line appears in /etc/yum.conf in
-the [main] section:
-gpgcheck=1
+
+If the system is joined to the Red Hat Network, a Red Hat Satellite Server,
+or a yum server, run the following command to install updates:
+$ sudo yum update
+If the system is not configured to use one of these sources, updates (in the form of RPM packages)
+can be manually downloaded from the Red Hat Network and installed using rpm.
+
+
+NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
+dictates.
|
-Changes to any software components can have significant effects on the
-overall security of the operating system. This requirement ensures the
-software has not been tampered with and that it has been provided by a
-trusted vendor.
-
-Accordingly, patches, service packs, device drivers, or operating system
-components must be signed with a certificate recognized and approved by the
-organization.
- Verifying the authenticity of the software prior to installation
-validates the integrity of the patch or upgrade received from a vendor.
-This ensures the software has not been tampered with and that it has been
-provided by a trusted vendor. Self-signed certificates are disallowed by
-this requirement. Certificates used to verify the software must be from an
-approved Certificate Authority (CA).
+Installing software updates is a fundamental mitigation against
+the exploitation of publicly-known vulnerabilities. If the most
+recent security patches and updates are not installed, unauthorized
+users may take advantage of weaknesses in the unpatched software. The
+lack of prompt attention to patching could result in a system compromise.
|
@@ -133,87 +128,92 @@
Req-6.2 |
- Ensure Software Patches Installed |
+ Ensure gpgcheck Enabled In Main yum Configuration |
-
-If the system is joined to the Red Hat Network, a Red Hat Satellite Server,
-or a yum server, run the following command to install updates:
-$ sudo yum update
-If the system is not configured to use one of these sources, updates (in the form of RPM packages)
-can be manually downloaded from the Red Hat Network and installed using rpm.
-
-
-NOTE: U.S. Defense systems are required to be patched within 30 days or sooner as local policy
-dictates.
+The gpgcheck option controls whether
+RPM packages' signatures are always checked prior to installation.
+To configure yum to check package signatures before installing
+them, ensure the following line appears in /etc/yum.conf in
+the [main] section:
+gpgcheck=1
|
-Installing software updates is a fundamental mitigation against
-the exploitation of publicly-known vulnerabilities. If the most
-recent security patches and updates are not installed, unauthorized
-users may take advantage of weaknesses in the unpatched software. The
-lack of prompt attention to patching could result in a system compromise.
+Changes to any software components can have significant effects on the
+overall security of the operating system. This requirement ensures the
+software has not been tampered with and that it has been provided by a
+trusted vendor.
+
+Accordingly, patches, service packs, device drivers, or operating system
+components must be signed with a certificate recognized and approved by the
+organization.
+ Verifying the authenticity of the software prior to installation
+validates the integrity of the patch or upgrade received from a vendor.
+This ensures the software has not been tampered with and that it has been
+provided by a trusted vendor. Self-signed certificates are disallowed by
+this requirement. Certificates used to verify the software must be from an
+approved Certificate Authority (CA).
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg User Ownership |
+ Verify /boot/grub2/grub.cfg Group Ownership |
-The file /boot/efi/EFI/redhat/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/grub2/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
+To properly set the group owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chgrp root /boot/grub2/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg User Ownership |
+ Verify the UEFI Boot Loader grub.cfg Group Ownership |
-The file /boot/grub2/grub.cfg should
-be owned by the root user to prevent destruction
-or modification of the file.
+The file /boot/efi/EFI/redhat/grub.cfg should
+be group-owned by the root group to prevent
+destruction or modification of the file.
-To properly set the owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chown root /boot/grub2/grub.cfg
+To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
|
-Only root should be able to modify important boot parameters.
+The root group is a highly-privileged group. Furthermore, the group-owner of this
+file should not have any access privileges anyway.
|
Req-7.1 |
- Verify /boot/grub2/grub.cfg Group Ownership |
+ Verify /boot/grub2/grub.cfg User Ownership |
The file /boot/grub2/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/grub2/grub.cfg , run the command:
-$ sudo chgrp root /boot/grub2/grub.cfg
+To properly set the owner of /boot/grub2/grub.cfg , run the command:
+$ sudo chown root /boot/grub2/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
Req-7.1 |
- Verify the UEFI Boot Loader grub.cfg Group Ownership |
+ Verify the UEFI Boot Loader grub.cfg User Ownership |
The file /boot/efi/EFI/redhat/grub.cfg should
-be group-owned by the root group to prevent
-destruction or modification of the file.
+be owned by the root user to prevent destruction
+or modification of the file.
-To properly set the group owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
-$ sudo chgrp root /boot/efi/EFI/redhat/grub.cfg
+To properly set the owner of /boot/efi/EFI/redhat/grub.cfg , run the command:
+$ sudo chown root /boot/efi/EFI/redhat/grub.cfg
|
-The root group is a highly-privileged group. Furthermore, the group-owner of this
-file should not have any access privileges anyway.
+Only root should be able to modify important boot parameters.
|
@@ -290,24 +290,42 @@
Req-8.1.8 |
- Set SSH Client Alive Count Max |
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation |
-The SSH server sends at most ClientAliveCountMax messages
-during a SSH session and waits for a response from the SSH client.
-The option ClientAliveInterval configures timeout after
-each ClientAliveCountMax message. If the SSH server does not
-receive a response from the client, then the connection is considered idle
-and terminated.
-For SSH earlier than v8.2, a ClientAliveCountMax value of 0
/usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml differs (ASCII text, with very long lines)
--- old//usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/scap-security-guide/tailoring/rhel7_stig_delta_tailoring.xml 2022-07-15 00:00:00.000000000 +0000
@@ -1,4 +1,4 @@
-1DISA STIG for Red Hat Enterprise Linux 7
+1DISA STIG for Red Hat Enterprise Linux 7
This profile contains configuration checks that align to the
DISA STIG for Red Hat Enterprise Linux V3R7.
/usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml differs (ASCII text, with very long lines)
--- old//usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/scap-security-guide/tailoring/rhel8_stig_delta_tailoring.xml 2022-07-15 00:00:00.000000000 +0000
@@ -1,4 +1,4 @@
-1DISA STIG for Red Hat Enterprise Linux 8
+1DISA STIG for Red Hat Enterprise Linux 8
This profile contains configuration checks that align to the
DISA STIG for Red Hat Enterprise Linux 8 V1R6.
/usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-centos7-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -205,14 +205,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -220,29 +225,40 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
+
+
+
+
+
@@ -250,34 +266,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -289,14 +305,9 @@
-
-
-
-
-
-
+
-
+
@@ -304,20 +315,9 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -325,24 +325,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -2215,11 +2215,6 @@
package --add=aide
/usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-centos7-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -207,14 +207,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -222,29 +227,40 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
+
+
+
+
+
@@ -252,34 +268,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -291,14 +307,9 @@
-
-
-
-
-
-
+
-
+
@@ -306,20 +317,9 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -327,24 +327,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -2217,11 +2217,6 @@
package --add=aide
/usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml differs (ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-centos7-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -51,14 +51,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -66,29 +71,40 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
+
+
+
+
+
@@ -96,34 +112,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -135,14 +151,9 @@
-
-
-
-
-
-
+
-
+
@@ -150,20 +161,9 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -171,24 +171,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -2061,11 +2061,6 @@
package --add=aide
/usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-centos8-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -241,14 +241,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -256,69 +261,75 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -330,14 +341,14 @@
-
+
-
+
-
+
-
+
@@ -345,25 +356,14 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -371,24 +371,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
/usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-centos8-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -243,14 +243,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -258,69 +263,75 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -332,14 +343,14 @@
-
+
-
+
-
+
-
+
@@ -347,25 +358,14 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -373,24 +373,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
/usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml differs (ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-centos8-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -51,14 +51,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -66,69 +71,75 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -140,14 +151,14 @@
-
+
-
+
-
+
-
+
@@ -155,25 +166,14 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -181,24 +181,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
/usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-cs9-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -189,29 +189,29 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -219,34 +219,35 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -254,35 +255,29 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
-
-
-
+
@@ -290,9 +285,9 @@
-
+
-
+
@@ -300,14 +295,14 @@
-
+
-
+
-
+
-
+
@@ -315,9 +310,14 @@
-
+
-
+
+
+
+
+
+
@@ -7824,11 +7824,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -7837,6 +7832,11 @@
}
}
/usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-cs9-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -191,29 +191,29 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -221,34 +221,35 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -256,35 +257,29 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
-
-
-
+
@@ -292,9 +287,9 @@
-
+
-
+
@@ -302,14 +297,14 @@
-
+
-
+
-
+
-
+
@@ -317,9 +312,14 @@
-
+
-
+
+
+
+
+
+
@@ -7826,11 +7826,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -7839,6 +7834,11 @@
}
}
/usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml differs (ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-cs9-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -51,29 +51,29 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -81,34 +81,35 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -116,35 +117,29 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
-
-
-
-
+
@@ -152,9 +147,9 @@
-
+
-
+
@@ -162,14 +157,14 @@
-
+
-
+
-
+
-
+
@@ -177,9 +172,14 @@
-
+
-
+
+
+
+
+
+
@@ -7686,11 +7686,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -7699,6 +7694,11 @@
}
}
/usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-fedora-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -175,14 +175,14 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
@@ -190,9 +190,9 @@
-
+
-
+
@@ -200,29 +200,35 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
+
+
+
+
+
+
+
@@ -230,9 +236,19 @@
-
+
-
+
+
+
+
+
+
+
+
+
+
+
@@ -244,14 +260,9 @@
-
-
-
-
-
-
+
-
+
@@ -259,25 +270,14 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -285,9 +285,9 @@
-
+
-
+
@@ -295,9 +295,9 @@
-
+
-
+
@@ -2240,11 +2240,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2253,6 +2248,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -10137,11 +10137,6 @@
package --add=sudo
-
-[[packages]]
/usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-fedora-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -175,14 +175,14 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
@@ -190,9 +190,9 @@
-
+
-
+
@@ -200,29 +200,35 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
+
+
+
+
+
+
+
@@ -230,9 +236,19 @@
-
+
-
+
+
+
+
+
+
+
+
+
+
+
@@ -244,14 +260,9 @@
-
-
-
-
-
-
+
-
+
@@ -259,25 +270,14 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -285,9 +285,9 @@
-
+
-
+
@@ -295,9 +295,9 @@
-
+
-
+
@@ -2240,11 +2240,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2253,6 +2248,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -10137,11 +10137,6 @@
package --add=sudo
-
-[[packages]]
/usr/share/xml/scap/ssg/content/ssg-fedora-ocil.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-fedora-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-fedora-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,670 +7,676 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
+
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
+ ocil:ssg-dconf_gnome_screensaver_idle_activation_locked_action:testaction:1
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Require Authentication for Emergency Systemd Target
+
+ Install sudo Package
- ocil:ssg-require_emergency_target_auth_action:testaction:1
+ ocil:ssg-package_sudo_installed_action:testaction:1
-
- Install the pcsc-lite package
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-package_pcsc-lite_installed_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Prevent remote hosts from connecting to the proxy display
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-sshd_x11_use_localhost_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Limit Password Reuse: system-auth
+
+ Require modules to be validly signed
- ocil:ssg-accounts_password_pam_pwhistory_remember_system_auth_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Verify Any Configured IPSec Tunnel Connections
+
+ Require Authentication for Single User Mode
- ocil:ssg-libreswan_approved_tunnels_action:testaction:1
+ ocil:ssg-require_singleuser_auth_action:testaction:1
-
- Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
+
+ Record Events that Modify User/Group Information via open syscall - /etc/gshadow
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1
+ ocil:ssg-audit_rules_etc_gshadow_open_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Harden SSH client Crypto Policy
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Verify Only Root Has UID 0
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Verify User Who Owns group File
+
+ Ensure SELinux Not Disabled in the kernel arguments
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-coreos_enable_selinux_kernel_argument_action:testaction:1
-
- Perform full reference count validation
+
+ Encrypt Audit Records Sent With audispd Plugin
- ocil:ssg-kernel_config_refcount_full_action:testaction:1
+ ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Add nosuid Option to /var/log
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-mount_option_var_log_nosuid_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Make sure that the dconf databases are up-to-date with regards to respective keyfiles
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-dconf_db_up_to_date_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Disable GDM Guest Login
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-gnome_gdm_disable_guest_login_action:testaction:1
-
- Set Password Hashing Algorithm in /etc/login.defs
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Record Successful Permission Changes to Files - removexattr
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-audit_rules_successful_file_modification_removexattr_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Enable Use of Strict Mode Checking
/usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-fedora-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,14 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
@@ -58,9 +58,9 @@
-
+
-
+
@@ -68,29 +68,35 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
+
+
+
+
+
+
+
+
@@ -98,9 +104,19 @@
-
+
-
+
+
+
+
+
+
+
+
+
+
+
@@ -112,14 +128,9 @@
-
-
-
-
-
-
+
-
+
@@ -127,25 +138,14 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -153,9 +153,9 @@
-
+
-
+
@@ -163,9 +163,9 @@
-
+
-
+
@@ -2108,11 +2108,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
class install_aide {
@@ -2121,6 +2116,11 @@
}
}
+
+[[packages]]
+name = "aide"
+version = "*"
+
- name: Ensure aide is installed
package:
name: aide
@@ -10005,11 +10005,6 @@
package --add=sudo
-
-[[packages]]
/usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol7-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -167,59 +167,60 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -227,49 +228,48 @@
-
+
-
+
-
+
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
-
+
-
+
-
-
-
-
+
+
+
-
+
-
+
@@ -277,24 +277,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -6451,11 +6451,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
/usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol7-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -169,59 +169,60 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -229,49 +230,48 @@
-
+
-
+
-
+
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
-
+
-
+
-
-
-
-
+
+
+
-
+
-
+
@@ -279,24 +279,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -6453,11 +6453,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
/usr/share/xml/scap/ssg/content/ssg-ol7-ocil.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol7-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol7-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,766 +7,760 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-dconf_gnome_screensaver_idle_activation_locked_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Configure firewalld To Rate Limit Connections
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-configure_firewalld_rate_limiting_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Require Authentication for Emergency Systemd Target
+
+ Add noexec Option to /var/tmp
- ocil:ssg-require_emergency_target_auth_action:testaction:1
+ ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
-
- Install the pcsc-lite package
+
+ Install sudo Package
- ocil:ssg-package_pcsc-lite_installed_action:testaction:1
+ ocil:ssg-package_sudo_installed_action:testaction:1
-
- Add noexec Option to /var/tmp
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Prevent remote hosts from connecting to the proxy display
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-sshd_x11_use_localhost_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Limit Password Reuse: system-auth
+
+ Install the Asset Configuration Compliance Module (ACCM)
- ocil:ssg-accounts_password_pam_pwhistory_remember_system_auth_action:testaction:1
+ ocil:ssg-install_mcafee_hbss_accm_action:testaction:1
-
- Verify Any Configured IPSec Tunnel Connections
+
+ Require modules to be validly signed
- ocil:ssg-libreswan_approved_tunnels_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
+
+ Require Authentication for Single User Mode
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1
+ ocil:ssg-require_singleuser_auth_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Record Events that Modify User/Group Information via open syscall - /etc/gshadow
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-audit_rules_etc_gshadow_open_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ The operating system must restrict privilege elevation to authorized personnel
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-sudo_restrict_privilege_elevation_to_authorized_action:testaction:1
-
- Configure auditd space_left on Low Disk Space
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-auditd_data_retention_space_left_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Harden SSH client Crypto Policy
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Verify User Who Owns group File
+
+ Uninstall squid Package
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-package_squid_removed_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Verify Only Root Has UID 0
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Ensure SELinux Not Disabled in the kernel arguments
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-coreos_enable_selinux_kernel_argument_action:testaction:1
-
- Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot
+
+ Encrypt Audit Records Sent With audispd Plugin
- ocil:ssg-sudo_add_ignore_dot_action:testaction:1
+ ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Use Only FIPS 140-2 Validated Ciphers
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-sshd_use_approved_ciphers_ordered_stig_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Add nosuid Option to /var/log
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-mount_option_var_log_nosuid_action:testaction:1
-
- Set Password Hashing Algorithm in /etc/login.defs
+
+ Make sure that the dconf databases are up-to-date with regards to respective keyfiles
- ocil:ssg-set_password_hashing_algorithm_logindefs_action:testaction:1
+ ocil:ssg-dconf_db_up_to_date_action:testaction:1
/usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol7-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,59 +43,60 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -103,49 +104,48 @@
-
+
-
+
-
+
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
-
+
-
+
-
-
-
-
+
+
+
-
+
-
+
@@ -153,24 +153,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -6327,11 +6327,6 @@
package --add=aide
-
-[[packages]]
-name = "aide"
-version = "*"
-
include install_aide
/usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol8-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -171,59 +171,60 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -231,44 +232,43 @@
-
+
-
+
-
+
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
-
+
-
+
-
-
-
-
+
+
+
@@ -276,9 +276,9 @@
-
+
-
+
@@ -286,24 +286,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -6559,11 +6559,6 @@
package --add=aide
-
-[[packages]]
/usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol8-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -173,59 +173,60 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -233,44 +234,43 @@
-
+
-
+
-
+
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
-
+
-
+
-
-
-
-
+
+
+
@@ -278,9 +278,9 @@
-
+
-
+
@@ -288,24 +288,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -6561,11 +6561,6 @@
package --add=aide
-
-[[packages]]
/usr/share/xml/scap/ssg/content/ssg-ol8-ocil.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol8-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol8-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,1666 +7,1660 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Record Any Attempts to Run chacl
+
+ Ensure Users Cannot Change GNOME3 Screensaver Idle Activation
- ocil:ssg-audit_rules_execution_chacl_action:testaction:1
+ ocil:ssg-dconf_gnome_screensaver_idle_activation_locked_action:testaction:1
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Require Authentication for Emergency Systemd Target
+
+ Add noexec Option to /var/tmp
- ocil:ssg-require_emergency_target_auth_action:testaction:1
+ ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
-
- Install the pcsc-lite package
+
+ Install sudo Package
- ocil:ssg-package_pcsc-lite_installed_action:testaction:1
+ ocil:ssg-package_sudo_installed_action:testaction:1
-
- Add noexec Option to /var/tmp
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Prevent remote hosts from connecting to the proxy display
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-sshd_x11_use_localhost_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Limit Password Reuse: system-auth
+
+ Install the Asset Configuration Compliance Module (ACCM)
- ocil:ssg-accounts_password_pam_pwhistory_remember_system_auth_action:testaction:1
+ ocil:ssg-install_mcafee_hbss_accm_action:testaction:1
-
- Verify Any Configured IPSec Tunnel Connections
+
+ Require modules to be validly signed
- ocil:ssg-libreswan_approved_tunnels_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
+
+ Require Authentication for Single User Mode
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1
+ ocil:ssg-require_singleuser_auth_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Record Events that Modify User/Group Information via open syscall - /etc/gshadow
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-audit_rules_etc_gshadow_open_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ The operating system must restrict privilege elevation to authorized personnel
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-sudo_restrict_privilege_elevation_to_authorized_action:testaction:1
-
- Configure auditd space_left on Low Disk Space
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-auditd_data_retention_space_left_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- System Audit Directories Must Be Group Owned By Root
+
+ Harden SSH client Crypto Policy
- ocil:ssg-directory_group_ownership_var_log_audit_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Uninstall squid Package
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-package_squid_removed_action:testaction:1
-
- Verify User Who Owns group File
+
+ Verify Only Root Has UID 0
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Ensure SELinux Not Disabled in the kernel arguments
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-coreos_enable_selinux_kernel_argument_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Encrypt Audit Records Sent With audispd Plugin
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1
-
- Ensure sudo Ignores Commands In Current Dir - sudo ignore_dot
+
+ Add nosuid Option to /var/log
- ocil:ssg-sudo_add_ignore_dot_action:testaction:1
+ ocil:ssg-mount_option_var_log_nosuid_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Make sure that the dconf databases are up-to-date with regards to respective keyfiles
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-dconf_db_up_to_date_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
/usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol8-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,59 +43,60 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -103,44 +104,43 @@
-
+
-
+
-
+
-
-
-
-
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
-
+
-
+
-
-
-
-
+
+
+
@@ -148,9 +148,9 @@
-
+
-
+
@@ -158,24 +158,24 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -6431,11 +6431,6 @@
package --add=aide
-
-[[packages]]
/usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol9-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -143,14 +143,14 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
@@ -158,64 +158,64 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -223,9 +223,9 @@
-
+
-
+
@@ -3434,11 +3434,6 @@
package --add=gnutls-utils
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3447,6 +3442,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3486,11 +3486,6 @@
package --add=nss-tools
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3499,6 +3494,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -5758,6 +5758,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
+ ---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/password-auth
+ overwrite: true
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/system-auth
+ overwrite: true
+
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
@@ -5930,26 +5950,6 @@
- no_empty_passwords
- no_reboot_needed
/usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol9-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -145,14 +145,14 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
@@ -160,64 +160,64 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -225,9 +225,9 @@
-
+
-
+
@@ -3436,11 +3436,6 @@
package --add=gnutls-utils
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3449,6 +3444,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3488,11 +3488,6 @@
package --add=nss-tools
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3501,6 +3496,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -5760,6 +5760,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
+ ---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/password-auth
+ overwrite: true
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/system-auth
+ overwrite: true
+
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
@@ -5932,26 +5952,6 @@
- no_empty_passwords
- no_reboot_needed
/usr/share/xml/scap/ssg/content/ssg-ol9-ocil.xml differs (XML 1.0 document, ASCII text)
--- old//usr/share/xml/scap/ssg/content/ssg-ol9-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol9-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,1018 +7,1018 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Record Access Events to Audit Log Directory
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Require modules to be validly signed
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Verify User Who Owns group File
+
+ Harden SSH client Crypto Policy
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Verify Only Root Has UID 0
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Enable Use of Strict Mode Checking
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-sshd_enable_strictmodes_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Disable ntpdate Service (ntpdate)
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-service_ntpdate_disabled_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Configure auditd max_log_file_action Upon Reaching Maximum Log Size
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-auditd_data_retention_max_log_file_action_action:testaction:1
-
- Allow Only SSH Protocol 2
+
+ Enable the NTP Daemon
- ocil:ssg-sshd_allow_only_protocol2_action:testaction:1
+ ocil:ssg-service_ntpd_enabled_action:testaction:1
-
- Record Unsuccessful Access Attempts to Files - creat
+
+ Prefer to use a 64-bit Operating System when supported
- ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1
+ ocil:ssg-prefer_64bit_os_action:testaction:1
-
- Ensure syslog-ng is Installed
+
+ Verify that System Executables Have Root Ownership
- ocil:ssg-package_syslogng_installed_action:testaction:1
+ ocil:ssg-file_ownership_binary_dirs_action:testaction:1
-
- Specify the hash to use when signing modules
+
+ Ensure SSH LoginGraceTime is configured
- ocil:ssg-kernel_config_module_sig_hash_action:testaction:1
+ ocil:ssg-sshd_set_login_grace_time_action:testaction:1
-
- Ensure gpgcheck Enabled In Main yum Configuration
+
+ Disable Accepting Packets Routed Between Local Interfaces
- ocil:ssg-ensure_gpgcheck_globally_activated_action:testaction:1
+ ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
-
- Enable Randomized Layout of Virtual Address Space
+
+ Verify User Who Owns Backup passwd File
- ocil:ssg-sysctl_kernel_randomize_va_space_action:testaction:1
+ ocil:ssg-file_owner_backup_etc_passwd_action:testaction:1
-
- Verify User Who Owns passwd File
+
+ Add nosuid Option to /dev/shm
- ocil:ssg-file_owner_etc_passwd_action:testaction:1
+ ocil:ssg-mount_option_dev_shm_nosuid_action:testaction:1
-
- Set SSH Client Alive Count Max
+
+ Ensure Logrotate Runs Periodically
/usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-ol9-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,14 +43,14 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
@@ -58,64 +58,64 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -123,9 +123,9 @@
-
+
-
+
@@ -3334,11 +3334,6 @@
package --add=gnutls-utils
-
-[[packages]]
-name = "gnutls-utils"
-version = "*"
-
include install_gnutls-utils
class install_gnutls-utils {
@@ -3347,6 +3342,11 @@
}
}
+
+[[packages]]
+name = "gnutls-utils"
+version = "*"
+
- name: Ensure gnutls-utils is installed
package:
name: gnutls-utils
@@ -3386,11 +3386,6 @@
package --add=nss-tools
-
-[[packages]]
-name = "nss-tools"
-version = "*"
-
include install_nss-tools
class install_nss-tools {
@@ -3399,6 +3394,11 @@
}
}
+
+[[packages]]
+name = "nss-tools"
+version = "*"
+
- name: Ensure nss-tools is installed
package:
name: nss-tools
@@ -5658,6 +5658,26 @@
run commands with the privileges of that account. Accounts with
empty passwords should never be used in operational environments.
+ ---
+apiVersion: machineconfiguration.openshift.io/v1
+kind: MachineConfig
+spec:
+ config:
+ ignition:
+ version: 3.1.0
+ storage:
+ files:
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/password-auth
+ overwrite: true
+ - contents:
+ source: data:,%23%20Generated%20by%20authselect%20on%20Sat%20Oct%2027%2014%3A59%3A36%202018%0A%23%20Do%20not%20modify%20this%20file%20manually.%0A%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_env.so%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_faildelay.so%20delay%3D2000000%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_fprintd.so%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet%0Aauth%20%20%20%20%20%20%20%20%5Bdefault%3D1%20ignore%3Dignore%20success%3Dok%5D%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20try_first_pass%0Aauth%20%20%20%20%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3E%3D%201000%20quiet_success%0Aauth%20%20%20%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20forward_pass%0Aauth%20%20%20%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_localuser.so%0Aaccount%20%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20uid%20%3C%201000%20quiet%0Aaccount%20%20%20%20%20%5Bdefault%3Dbad%20success%3Dok%20user_unknown%3Dignore%5D%20pam_sss.so%0Aaccount%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_permit.so%0A%0Apassword%20%20%20%20requisite%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_pwquality.so%20try_first_pass%20local_users_only%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%20sha512%20shadow%20try_first_pass%20use_authtok%0Apassword%20%20%20%20sufficient%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%20use_authtok%0Apassword%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_deny.so%0A%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_keyinit.so%20revoke%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_limits.so%0A-session%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_systemd.so%0Asession%20%20%20%20%20%5Bsuccess%3D1%20default%3Dignore%5D%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_succeed_if.so%20service%20in%20crond%20quiet%20use_uid%0Asession%20%20%20%20%20required%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_unix.so%0Asession%20%20%20%20%20optional%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20pam_sss.so%0A
+ mode: 0644
+ path: /etc/pam.d/system-auth
+ overwrite: true
+
# Remediation is applicable only in certain platforms
if [ ! -f /.dockerenv ] && [ ! -f /run/.containerenv ]; then
@@ -5830,26 +5850,6 @@
- no_empty_passwords
- no_reboot_needed
/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -155,19 +155,24 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -175,29 +180,30 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -205,9 +211,19 @@
-
+
-
+
+
+
+
+
+
+
+
+
+
+
@@ -219,9 +235,9 @@
-
+
-
+
@@ -229,35 +245,19 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
-
+
-
+
@@ -265,9 +265,9 @@
-
+
-
+
@@ -7495,7 +7495,8 @@
access when the system is rebooted.
CCE-82496-1
- apiVersion: machineconfiguration.openshift.io/v1
+ ---
+apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
@@ -7503,15 +7504,10 @@
version: 3.1.0
systemd:
units:
- - name: debug-shell.service
- enabled: false
- mask: true
- - name: debug-shell.socket
- enabled: false
- mask: true
+ - enabled: false
+ name: debug-shell.service
- ---
-apiVersion: machineconfiguration.openshift.io/v1
+ apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
@@ -7519,8 +7515,12 @@
version: 3.1.0
systemd:
units:
- - enabled: false
- name: debug-shell.service
+ - name: debug-shell.service
+ enabled: false
+ mask: true
+ - name: debug-shell.socket
/usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-ds.xml 2022-07-15 00:00:00.000000000 +0000
@@ -155,19 +155,24 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -175,29 +180,30 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -205,9 +211,19 @@
-
+
-
+
+
+
+
+
+
+
+
+
+
+
@@ -219,9 +235,9 @@
-
+
-
+
@@ -229,35 +245,19 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
-
+
-
+
@@ -265,9 +265,9 @@
-
+
-
+
@@ -7495,7 +7495,8 @@
access when the system is rebooted.
CCE-82496-1
- apiVersion: machineconfiguration.openshift.io/v1
+ ---
+apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
@@ -7503,15 +7504,10 @@
version: 3.1.0
systemd:
units:
- - name: debug-shell.service
- enabled: false
- mask: true
- - name: debug-shell.socket
- enabled: false
- mask: true
+ - enabled: false
+ name: debug-shell.service
- ---
-apiVersion: machineconfiguration.openshift.io/v1
+ apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
@@ -7519,8 +7515,12 @@
version: 3.1.0
systemd:
units:
- - enabled: false
- name: debug-shell.service
+ - name: debug-shell.service
+ enabled: false
+ mask: true
+ - name: debug-shell.socket
/usr/share/xml/scap/ssg/content/ssg-rhcos4-ocil.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-ocil.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-ocil.xml 2022-07-15 00:00:00.000000000 +0000
@@ -7,22 +7,16 @@
2022-07-15T00:00:00
-
- Ensure auditd Collects File Deletion Events by User - rename
-
- ocil:ssg-audit_rules_file_deletion_events_rename_action:testaction:1
-
-
-
- Disable Accepting Packets Routed Between Local Interfaces
+
+ Ensure Users Re-Authenticate for Privilege Escalation - sudo NOPASSWD
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_local_action:testaction:1
+ ocil:ssg-sudo_remove_nopasswd_action:testaction:1
-
- Configure auditd Disk Error Action on Disk Error
+
+ Disable PubkeyAuthentication Authentication
- ocil:ssg-auditd_data_disk_error_action_action:testaction:1
+ ocil:ssg-sshd_disable_pubkey_auth_action:testaction:1
@@ -31,454 +25,448 @@
ocil:ssg-mount_option_var_tmp_noexec_action:testaction:1
-
- Disable Kernel Parameter for Accepting Source-Routed Packets on all IPv4 Interfaces
-
- ocil:ssg-sysctl_net_ipv4_conf_all_accept_source_route_action:testaction:1
-
-
-
- Record Access Events to Audit Log Directory
+
+ Install sudo Package
- ocil:ssg-directory_access_var_log_audit_action:testaction:1
+ ocil:ssg-package_sudo_installed_action:testaction:1
-
- Configure auditd mail_acct Action on Low Disk Space
+
+ Verify All Account Password Hashes are Shadowed
- ocil:ssg-auditd_data_retention_action_mail_acct_action:testaction:1
+ ocil:ssg-accounts_password_all_shadowed_action:testaction:1
-
- Configure auditd space_left on Low Disk Space
+
+ Unmap kernel when running in userspace (aka KAISER)
- ocil:ssg-auditd_data_retention_space_left_action:testaction:1
+ ocil:ssg-kernel_config_unmap_kernel_at_el0_action:testaction:1
-
- Ensure Rsyslog Authenticates Off-Loaded Audit Records
+
+ Require modules to be validly signed
- ocil:ssg-rsyslog_encrypt_offload_actionsendstreamdriverauthmode_action:testaction:1
+ ocil:ssg-kernel_config_module_sig_force_action:testaction:1
-
- Verify User Who Owns group File
+
+ Require Authentication for Single User Mode
- ocil:ssg-file_owner_etc_group_action:testaction:1
+ ocil:ssg-require_singleuser_auth_action:testaction:1
-
- Ensure that System Accounts Are Locked
+
+ Record Events that Modify User/Group Information via open syscall - /etc/gshadow
- ocil:ssg-no_password_auth_for_systemaccounts_action:testaction:1
+ ocil:ssg-audit_rules_etc_gshadow_open_action:testaction:1
-
- Ensure auditd Collects Information on the Use of Privileged Commands - unix_chkpwd
+
+ Verify Permissions on SSH Server Private *_key Key Files
- ocil:ssg-audit_rules_privileged_commands_unix_chkpwd_action:testaction:1
+ ocil:ssg-file_permissions_sshd_private_key_action:testaction:1
-
- Verify Permissions on Backup passwd File
+
+ Harden SSH client Crypto Policy
- ocil:ssg-file_permissions_backup_etc_passwd_action:testaction:1
+ ocil:ssg-harden_ssh_client_crypto_policy_action:testaction:1
-
- Record Events that Modify the System's Mandatory Access Controls
+
+ Verify Only Root Has UID 0
- ocil:ssg-audit_rules_mac_modification_action:testaction:1
+ ocil:ssg-accounts_no_uid_except_zero_action:testaction:1
-
- Disable Compression Or Set Compression to delayed
+
+ Ensure SELinux Not Disabled in the kernel arguments
- ocil:ssg-sshd_disable_compression_action:testaction:1
+ ocil:ssg-coreos_enable_selinux_kernel_argument_action:testaction:1
-
- Verify User Who Owns /var/log Directory
+
+ Encrypt Audit Records Sent With audispd Plugin
- ocil:ssg-file_owner_var_log_action:testaction:1
+ ocil:ssg-auditd_audispd_encrypt_sent_records_action:testaction:1
-
- Sign kernel modules with SHA-512
+
+ Verify Group Who Owns SSH Server config file
- ocil:ssg-kernel_config_module_sig_sha512_action:testaction:1
+ ocil:ssg-file_groupowner_sshd_config_action:testaction:1
-
- Allow Only SSH Protocol 2
+
+ Add nosuid Option to /var/log
- ocil:ssg-sshd_allow_only_protocol2_action:testaction:1
+ ocil:ssg-mount_option_var_log_nosuid_action:testaction:1
-
- Record Unsuccessful Access Attempts to Files - creat
+
+ Ensure auditd Collects Information on Kernel Module Unloading - delete_module
- ocil:ssg-audit_rules_unsuccessful_file_modification_creat_action:testaction:1
+ ocil:ssg-audit_rules_kernel_module_loading_delete_action:testaction:1
-
- Disable Kernel Parameter for Sending ICMP Redirects on all IPv4 Interfaces
+
+ Record Events that Modify the System's Discretionary Access Controls - fchownat
- ocil:ssg-sysctl_net_ipv4_conf_all_send_redirects_action:testaction:1
+ ocil:ssg-audit_rules_dac_modification_fchownat_action:testaction:1
-
- Enable page allocator poisoning
+
+ Record Access Events to Audit Log Directory
- ocil:ssg-coreos_page_poison_kernel_argument_action:testaction:1
+ ocil:ssg-directory_access_var_log_audit_action:testaction:1
-
- Ensure syslog-ng is Installed
+
+ Enable Use of Strict Mode Checking
- ocil:ssg-package_syslogng_installed_action:testaction:1
+ ocil:ssg-sshd_enable_strictmodes_action:testaction:1
-
- Specify the hash to use when signing modules
+
+ Configure auditd max_log_file_action Upon Reaching Maximum Log Size
- ocil:ssg-kernel_config_module_sig_hash_action:testaction:1
/usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-rhcos4-xccdf.xml 2022-07-15 00:00:00.000000000 +0000
@@ -43,19 +43,24 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -63,29 +68,30 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
-
-
+
+
+
+
-
+
-
+
@@ -93,9 +99,19 @@
-
+
-
+
+
+
+
+
+
+
+
+
+
+
@@ -107,9 +123,9 @@
-
+
-
+
@@ -117,35 +133,19 @@
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
-
+
-
+
@@ -153,9 +153,9 @@
-
+
-
+
@@ -7383,7 +7383,8 @@
access when the system is rebooted.
CCE-82496-1
- apiVersion: machineconfiguration.openshift.io/v1
+ ---
+apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
@@ -7391,15 +7392,10 @@
version: 3.1.0
systemd:
units:
- - name: debug-shell.service
- enabled: false
- mask: true
- - name: debug-shell.socket
- enabled: false
- mask: true
+ - enabled: false
+ name: debug-shell.service
- ---
-apiVersion: machineconfiguration.openshift.io/v1
+ apiVersion: machineconfiguration.openshift.io/v1
kind: MachineConfig
spec:
config:
@@ -7407,8 +7403,12 @@
version: 3.1.0
systemd:
units:
- - enabled: false
- name: debug-shell.service
+ - name: debug-shell.service
+ enabled: false
+ mask: true
+ - name: debug-shell.socket
/usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml differs (XML 1.0 document, ASCII text, with very long lines)
--- old//usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
+++ new//usr/share/xml/scap/ssg/content/ssg-rhel7-ds-1.2.xml 2022-07-15 00:00:00.000000000 +0000
@@ -191,14 +191,19 @@
countries. All other names are registered trademarks or trademarks of their
respective companies.
-
+
-
+
-
+
-
+
+
+
+
+
+
@@ -206,29 +211,40 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
+
+
+
+
+
+
+
+
+
+
+
@@ -236,34 +252,34 @@
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
-
+
@@ -275,14 +291,9 @@
-
-
-
-
-
-
+
-
+
@@ -290,20 +301,9 @@
-
-
-
-
-
-
-
-
-
-
-
-
+
-
+
@@ -311,24 +311,24 @@
-
+
-
+
-
+
-
+
-
+
- | |
|
|