content
content copied to clipboard
Security automation content in SCAP, Bash, Ansible, and other formats
#### Share the context Running the RHEL 8 STIG scan on a STIG-hardened UEFI-boot RedHat 8 VM #### Description of problem: When RHEL-08-010140 and RHEL-08-010141 are audited on a UEFI...
#### Description: Remove the 1.3.1 references for the OCP garbage collection rules
#### Description: - _Description here. Replace this text. Don't use the italics format!_ #### Rationale: - _Rationale here. Replace this text. Don't use the italics format!_ - Fixes # _Issue...
#### Description of problem: Failing tests: /hardening/anaconda/with-gui/stig_gui/enable_gpgcheck_for_all_repositories /hardening/anaconda/stig/enable_gpgcheck_for_all_repositories #### SCAP Security Guide Version: 5049fed40d7ce809830b4fe9ceea76c7f59a4d35 #### Operating System Version: RHEL8 #### Actual Results: Rule failing after system installation #### Expected Results:...
#### Description of problem: The content is misaligned with an external (third party) content that targets the same policy - typically, this means that a system hardened by our content...
#### Description of problem: The `uefi` (and its counterpart `non-uefi`) platform has different conditionals across supported template types: ```yaml name: cpe:/a:uefi title: System boot mode is UEFI # This OVAl...
#### Description of problem: * `disa-content-alignment-remediations Ansible` * `disa-content-alignment-remediations Ansible (GUI)` * `disa-content-alignment-remediations Bash` * `disa-content-alignment-remediations Bash (GUI)` fail with ``` Misalignments not passing after waiving: CCE-82473-0 CCI-000199 - SV-230367r627750_rule...
When https://bugzilla.redhat.com/show_bug.cgi?id=1410638 is fixed, undo the changes of #2189
#### Description of problem: On 2025-02-12, the daily productization run shows the following fails on RHEL 8.10: - /scanning/disa-alignment/ansible/file_permission_user_init_files_root - /scanning/disa-alignment/oscap/file_permission_user_init_files_root The content is misaligned with an external (third party)...
#### Description of problem: ``` harden_sshd_ciphers_openssh_conf_crypto_policy harden_sshd_ciphers_opensshserver_conf_crypto_policy harden_sshd_macs_openssh_conf_crypto_policy harden_sshd_macs_opensshserver_conf_crypto_policy ``` fail on RHEL-8 (`stig` and `stig_gui`) when using the content-provided Anaconda kickstarts, when the installer is booted with `fips=1`, as...