You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When running the DISA STIG for audit rules, the STIG looks for -k perm_mod while the content here looks for -F key=privileged resulting in a number of rule failures. Screenshot and references below are for chacl but this affects more than just this check. Other checks the stig expects -k privileged-unix-update while the content here expects -F key=privileged. There may be additional rules affected but these are what popped when doing a scan after extracting the audit rules from the stig content. Not being an expert in audit rules, I'd venture a guess they both result in similar if not identical behavior, but this show as a very large failure when scanning systems for us. Need to defer to others on if an update should be pushed towards the vendor to allow the simpler syntax currently in the checks.
Several of these rules are also affected by #13075
Description of problem:
When running the DISA STIG for audit rules, the STIG looks for
-k perm_mod
while the content here looks for-F key=privileged
resulting in a number of rule failures. Screenshot and references below are forchacl
but this affects more than just this check. Other checks the stig expects-k privileged-unix-update
while the content here expects-F key=privileged
. There may be additional rules affected but these are what popped when doing a scan after extracting the audit rules from the stig content. Not being an expert in audit rules, I'd venture a guess they both result in similar if not identical behavior, but this show as a very large failure when scanning systems for us. Need to defer to others on if an update should be pushed towards the vendor to allow the simpler syntax currently in the checks.Several of these rules are also affected by #13075
This content is not aligned with content from https://www.stigviewer.com/stig/red_hat_enterprise_linux_9/ .
The misalignment affects these profiles:
The misalignment affects these rules, the stig expected value is in parenthesis:
Outcome:
Version Info:
External Content's Version:
https://www.stigviewer.com/stig/red_hat_enterprise_linux_9/
https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_RHEL_9_V2R3_STIG_SCAP_1-3_Benchmark.zip
The text was updated successfully, but these errors were encountered: