178
178
<check distro =" SLES" command =" CheckMatchingLinesAll" path =" /etc/pam.d/common-password" filter =" password\s+(?:requisite|required)\s+pam_cracklib\.so" regex =" (try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))" />
179
179
<check distro =" CentOS=6|RedHat=6|Oracle=6" command =" CheckMatchingLinesAll" path =" /etc/pam.d/system-auth" filter =" password\s+(?:requisite|required)\s+pam_cracklib\.so" regex =" (try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))" />
180
180
<check distro =" CentOS=6|RedHat=6|Oracle=6" command =" CheckMatchingLinesAll" path =" /etc/pam.d/password-auth" filter =" password\s+(?:requisite|required)\s+pam_cracklib\.so" regex =" (try_first_pass(?:\s+|$))|(minlen=(?:1[4-9]|[2-9][0-9])(?:\s+|$))|(dcredit=-1(?:\s+|$))|(ucredit=-1(?:\s+|$))|(ocredit=-1(?:\s+|$))|(lcredit=-1(?:\s+|$))" />
181
- <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner" command =" CheckFileExists" path =" /etc/security/pwquality.conf" />
182
- <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner" command =" CheckPwQuality" path =" /etc/security/pwquality.conf" />
181
+ <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner|AlmaLinux|Rocky " command =" CheckFileExists" path =" /etc/security/pwquality.conf" />
182
+ <check distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|Mariner|AlmaLinux|Rocky " command =" CheckPwQuality" path =" /etc/security/pwquality.conf" />
183
183
</audit >
184
184
185
185
<audit
202
202
<check distro =" *" command =" CheckUserDirs" expect =" exists" />
203
203
</audit >
204
204
205
- <audit
206
- description =" Ensure users own their home directories"
205
+ <audit
206
+ description =" Ensure users own their home directories"
207
207
msid =" 6.2.9"
208
208
impact =" Since the user is accountable for files stored in the user home directory, the user must be the owner of the directory."
209
209
remediation =" Change the ownership of any home directories that are not owned by the defined user to the correct user."
302
302
</audit >
303
303
</audits >
304
304
<remediations >
305
- <!--
305
+ <!--
306
306
Remediations are preformed in the order they appear in this file.
307
307
All actions in a remediation that match the distro are performed, and in the order they appear.
308
308
-->
316
316
<action distro =" *" action =" ActionEditConfig" name =" fs.suid_dumpable" value =" 0" value-regex =" [0-9]+" sep =" =" path =" /etc/sysctl.conf" />
317
317
<action distro =" *" action =" ActionScript" >
318
318
<script >
319
- <![CDATA[
319
+ <![CDATA[
320
320
sysctl -w fs.suid_dumpable=0
321
321
]]>
322
322
</script >
@@ -341,8 +341,8 @@ sysctl -w fs.suid_dumpable=0
341
341
342
342
<remediation id =" enable-password-requirements" msids =" 5.3.1" description =" Ensure password creation requirements are configured" >
343
343
<action distro =" Ubuntu|Debian" action =" ActionInstallPackage" package =" libpam-pwquality" />
344
- <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian" action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minlen" sep =" = " value =" 14" value-regex =" [1-9][0-9]*" />
345
- <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian" action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minclass" sep =" = " value =" 4" value-regex =" [0-4]" />
344
+ <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|AlmaLinux|Rocky " action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minlen" sep =" = " value =" 14" value-regex =" [1-9][0-9]*" />
345
+ <action distro =" CentOS>6|RedHat>6|Oracle>6|Ubuntu|Debian|AlmaLinux|Rocky " action =" ActionEditConfig" path =" /etc/security/pwquality.conf" name =" minclass" sep =" = " value =" 4" value-regex =" [0-4]" />
346
346
</remediation >
347
347
348
348
</remediations >
0 commit comments