On 10/11/13 10:19 AM, David Smith wrote:
From: David Smith <[email protected]>--- .../accounts_password_pam_cracklib_dcredit.xml | 1 + .../accounts_password_pam_cracklib_difok.xml | 1 + .../accounts_password_pam_cracklib_lcredit.xml | 1 + .../accounts_password_pam_cracklib_ocredit.xml | 1 + .../accounts_password_pam_cracklib_ucredit.xml | 1 + .../checks/audit_rules_file_deletion_events.xml | 1 + RHEL6/input/checks/audit_rules_media_export.xml | 1 + .../input/checks/audit_rules_sysadmin_actions.xml | 1 + RHEL6/input/checks/audit_rules_time_adjtimex.xml | 1 + .../audit_rules_unsuccessful_file_modification.xml | 1 + 10 files changed, 10 insertions(+), 0 deletions(-) diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml index 182313a..b0e13f4 100644 --- a/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml +++ b/RHEL6/input/checks/accounts_password_pam_cracklib_dcredit.xml @@ -7,6 +7,7 @@ </affected> <description>The password dcredit should meet minimum requirements using pam_cracklib</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="Conditions for dcredit are satisfied" diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml index 37945cd..2aad2de 100644 --- a/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml +++ b/RHEL6/input/checks/accounts_password_pam_cracklib_difok.xml @@ -7,6 +7,7 @@ </affected> <description>The password difok should meet minimum requirements using pam_cracklib</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="Conditions for difok are satisfied" diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml index f9c42f0..a4f35f0 100644 --- a/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml +++ b/RHEL6/input/checks/accounts_password_pam_cracklib_lcredit.xml @@ -7,6 +7,7 @@ </affected> <description>The password lcredit should meet minimum requirements using pam_cracklib</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="Conditions for lcredit are satisfied" diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml index 8d433f4..39d106f 100644 --- a/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml +++ b/RHEL6/input/checks/accounts_password_pam_cracklib_ocredit.xml @@ -7,6 +7,7 @@ </affected> <description>The password ocredit should meet minimum requirements using pam_cracklib</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="Conditions for ocredit are satisfied" diff --git a/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml b/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml index 9227167..0e2c478 100644 --- a/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml +++ b/RHEL6/input/checks/accounts_password_pam_cracklib_ucredit.xml @@ -7,6 +7,7 @@ </affected> <description>The password ucredit should meet minimum requirements using pam_cracklib</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="Conditions for ucredit are satisfied" diff --git a/RHEL6/input/checks/audit_rules_file_deletion_events.xml b/RHEL6/input/checks/audit_rules_file_deletion_events.xml index 9995642..d93d4d2 100644 --- a/RHEL6/input/checks/audit_rules_file_deletion_events.xml +++ b/RHEL6/input/checks/audit_rules_file_deletion_events.xml @@ -6,6 +6,7 @@ <platform>Red Hat Enterprise Linux 6</platform> </affected> <description>Audit files deletion events.</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="audit file delete" test_ref="test_audit_rules_file_deletion_events" /> diff --git a/RHEL6/input/checks/audit_rules_media_export.xml b/RHEL6/input/checks/audit_rules_media_export.xml index 7019700..5adbfd2 100644 --- a/RHEL6/input/checks/audit_rules_media_export.xml +++ b/RHEL6/input/checks/audit_rules_media_export.xml @@ -6,6 +6,7 @@ <platform>Red Hat Enterprise Linux 6</platform> </affected> <description>Audit rules that detect the mounting of filesystems should be enabled.</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="audit mount" test_ref="test_audit_rules_media_export" /> diff --git a/RHEL6/input/checks/audit_rules_sysadmin_actions.xml b/RHEL6/input/checks/audit_rules_sysadmin_actions.xml index 485f12e..081eedf 100644 --- a/RHEL6/input/checks/audit_rules_sysadmin_actions.xml +++ b/RHEL6/input/checks/audit_rules_sysadmin_actions.xml @@ -6,6 +6,7 @@ <platform>Red Hat Enterprise Linux 6</platform> </affected> <description>Audit actions taken by system administrators on the system.</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria> <criterion comment="audit sudoers" test_ref="test_audit_rules_sysadmin_actions" /> diff --git a/RHEL6/input/checks/audit_rules_time_adjtimex.xml b/RHEL6/input/checks/audit_rules_time_adjtimex.xml index bbafe7f..ca3b631 100644 --- a/RHEL6/input/checks/audit_rules_time_adjtimex.xml +++ b/RHEL6/input/checks/audit_rules_time_adjtimex.xml @@ -8,6 +8,7 @@ </affected> <description>Record attempts to alter time through adjtimex. </description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria comment="Test for either..." operator="OR"> <criteria comment="both..." operator="AND"> diff --git a/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml b/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml index 424462b..c2305f3 100644 --- a/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml +++ b/RHEL6/input/checks/audit_rules_unsuccessful_file_modification.xml @@ -8,6 +8,7 @@ </affected> <description>Audit rules about the Unauthorized Access Attempts to Files (unsuccessful) are enabled</description> + <reference source="DS" ref_id="20131011" ref_url="test_attestation" /> </metadata> <criteria operator="AND"> <criterion comment="audit file eacces" test_ref="test_audit_rules_unsuccessful_file_modification_eacces" />
ack _______________________________________________ scap-security-guide mailing list [email protected] https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
