Signed-off-by: Willy Santos <wsantos@redhat> --- rhel6/src/input/system/permissions/execution.xml | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/rhel6/src/input/system/permissions/execution.xml b/rhel6/src/input/system/permissions/execution.xml index d83fef4..1c1a58b 100644 --- a/rhel6/src/input/system/permissions/execution.xml +++ b/rhel6/src/input/system/permissions/execution.xml @@ -184,7 +184,7 @@ on AMD-based systems.</description> <rationale>Computers with the ability to prevent this type of code execution frequently put an option in the BIOS that will allow users to turn the feature on or off at will.</rationale> <ident cce="4177-2" /> -<!--<ref nist="CM-7" />--> +<ref nist="CM-6" /> </Rule> </Group> <!--<Group id="enable_nx"> --> -- 1.7.7.6 _______________________________________________ scap-security-guide mailing list scap-security-guide@lists.fedorahosted.org https://fedorahosted.org/mailman/listinfo/scap-security-guide